Show filters
88 Total Results
Displaying 71-80 of 88
Sort by:
Attacker Value
Unknown
CVE-2021-40413
Disclosure Date: January 28, 2022 (last updated February 23, 2025)
An incorrect default permission vulnerability exists in the cgiserver.cgi cgi_check_ability functionality of reolink RLC-410W v3.0.0.136_20121102. The UpgradePrepare is the API that checks if a provided filename identifies a new version of the RLC-410W firmware. If the version is new, it would be possible, allegedly, to later on perform the Upgrade. An attacker can send an HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2021-40412
Disclosure Date: January 28, 2022 (last updated February 23, 2025)
An OScommand injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [8] the devname variable, that has the value of the name parameter provided through the SetDevName API, is not validated properly. This would lead to an OS command injection.
0
Attacker Value
Unknown
CVE-2021-40411
Disclosure Date: January 28, 2022 (last updated February 23, 2025)
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [6] the dns_data->dns2 variable, that has the value of the dns2 parameter provided through the SetLocalLink API, is not validated properly. This would lead to an OS command injection.
0
Attacker Value
Unknown
CVE-2021-40410
Disclosure Date: January 28, 2022 (last updated February 23, 2025)
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [4] the dns_data->dns1 variable, that has the value of the dns1 parameter provided through the SetLocal API, is not validated properly. This would lead to an OS command injection.
0
Attacker Value
Unknown
CVE-2021-40409
Disclosure Date: January 28, 2022 (last updated February 23, 2025)
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->password variable, that has the value of the password parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection.
0
Attacker Value
Unknown
CVE-2021-40408
Disclosure Date: January 28, 2022 (last updated February 23, 2025)
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->username variable, that has the value of the userName parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection.
0
Attacker Value
Unknown
CVE-2021-40407
Disclosure Date: January 28, 2022 (last updated February 23, 2025)
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2021-40406
Disclosure Date: January 28, 2022 (last updated February 23, 2025)
A denial of service vulnerability exists in the cgiserver.cgi session creation functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to prevent users from logging in. An attacker can send an HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2021-40404
Disclosure Date: January 28, 2022 (last updated February 23, 2025)
An authentication bypass vulnerability exists in the cgiserver.cgi Login functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to authentication bypass. An attacker can send an HTTP request to trigger this vulnerability.
0
Attacker Value
Unknown
CVE-2021-44356
Disclosure Date: January 26, 2022 (last updated February 23, 2025)
Multiple denial of service vulnerabilities exist in the cgiserver.cgi JSON command parser functionality of Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. An attacker can send an HTTP request to trigger this vulnerability.
0