Lucene search

K
cve[email protected]CVE-2021-44379
HistoryJan 28, 2022 - 10:15 p.m.

CVE-2021-44379

2022-01-2822:15:12
CWE-20
web.nvd.nist.gov
32
cve-2021-44379
denial of service
vulnerability
reolink
rlc-410w
http request
json command parser
cgiserver.cgi

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

36.2%

A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetAutoMaint param is not object. An attacker can send an HTTP request to trigger this vulnerability.

Affected configurations

NVD
Node
reolinkrlc-410w_firmwareMatch3.0.0.136_20121102
AND
reolinkrlc-410wMatch-
VendorProductVersionCPE
reolinkrlc-410w_firmware3.0.0.136+20121102cpe:/o:reolink:rlc-410w_firmware:3.0.0.136+20121102:::

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:N/I:N/A:C

CVSS3

7.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

AI Score

7.4

Confidence

High

EPSS

0.001

Percentile

36.2%

Related for CVE-2021-44379