Description
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [6] the dns_data->dns2 variable, that has the value of the dns2 parameter provided through the SetLocalLink API, is not validated properly. This would lead to an OS command injection.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-27588 | An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [6] the dns_data->dns2 variable, that has the value of the dns2 parameter provided through the SetLocalLink API, is not validated properly. This would lead to an OS command injection. |
References
History
Tue, 15 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-04-15T19:20:14.899Z
Reserved: 2021-09-01T00:00:00.000Z
Link: CVE-2021-40411
Updated: 2024-08-04T02:44:09.994Z
Status : Modified
Published: 2022-01-28T20:15:11.783
Modified: 2024-11-21T06:24:04.670
Link: CVE-2021-40411
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD