- Description
- On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Secondary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Data from CISA
- Vulnerability name
- Reolink Multiple IP Cameras OS Command Injection Vulnerability
- Exploit added on
- Dec 18, 2024
- Exploit action due
- Jan 8, 2025
- Required action
- The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:reolink:rlc-410w_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3E2B849F-7B64-4F91-AB7E-F30E6C985E82",
"versionEndIncluding": "1.0.227"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "260FB388-A221-4900-92FB-FAB90529647D"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:reolink:c1_pro_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "194BCD5A-FD4D-4033-9B01-0F4265FD457F",
"versionEndIncluding": "1.0.227"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:reolink:c1_pro:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "74E8E50D-04C9-4E55-BEF3-529DE454D246"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:reolink:c2_pro_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6264361B-DDB6-4ED3-AAD4-3720C61F4252",
"versionEndIncluding": "1.0.227"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:reolink:c2_pro:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4772378F-9C3C-4922-A881-ED97FD146E99"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:reolink:rlc-422w_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "35B08D45-0987-4776-873A-E2F96953CC9B",
"versionEndIncluding": "1.0.227"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:reolink:rlc-422w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "32CC3B56-E72B-40AB-8B61-1CDEA37EEC26"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:reolink:rlc-511w_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6C88B6DF-E0A7-4681-9037-70BE3D6EA74D",
"versionEndIncluding": "1.0.227"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:reolink:rlc-511w:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "E71BC51D-7C0F-4FDE-9B7E-020B6338644F"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]