CVE-2019-11001
Published Apr 8, 2019
Last updated 6 years ago
Overview
- Description
- On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-78
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:reolink:rlc-410w_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E2B849F-7B64-4F91-AB7E-F30E6C985E82", "versionEndIncluding": "1.0.227" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "260FB388-A221-4900-92FB-FAB90529647D" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:reolink:c1_pro_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "194BCD5A-FD4D-4033-9B01-0F4265FD457F", "versionEndIncluding": "1.0.227" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:reolink:c1_pro:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "74E8E50D-04C9-4E55-BEF3-529DE454D246" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:reolink:c2_pro_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6264361B-DDB6-4ED3-AAD4-3720C61F4252", "versionEndIncluding": "1.0.227" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:reolink:c2_pro:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4772378F-9C3C-4922-A881-ED97FD146E99" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:reolink:rlc-422w_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35B08D45-0987-4776-873A-E2F96953CC9B", "versionEndIncluding": "1.0.227" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:reolink:rlc-422w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "32CC3B56-E72B-40AB-8B61-1CDEA37EEC26" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:reolink:rlc-511w_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C88B6DF-E0A7-4681-9037-70BE3D6EA74D", "versionEndIncluding": "1.0.227" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:reolink:rlc-511w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E71BC51D-7C0F-4FDE-9B7E-020B6338644F" } ], "operator": "OR" } ], "operator": "AND" } ]