An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. All the Get APIs that are not included in cgi_check_ability are already executable by any logged-in users. An attacker can send an HTTP request to trigger this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-27593 An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. All the Get APIs that are not included in cgi_check_ability are already executable by any logged-in users. An attacker can send an HTTP request to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 15 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-04-15T19:20:42.225Z

Reserved: 2021-09-01T00:00:00.000Z

Link: CVE-2021-40416

cve-icon Vulnrichment

Updated: 2024-08-04T02:44:09.629Z

cve-icon NVD

Status : Modified

Published: 2022-01-28T20:15:12.007

Modified: 2024-11-21T06:24:05.390

Link: CVE-2021-40416

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.