Vulnerabilites related to reolink - rlc-422w
Vulnerability from fkie_nvd
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/ | Exploit, Third Party Advisory, Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/ | Exploit, Third Party Advisory, Broken Link |
Vendor | Product | Version | |
---|---|---|---|
reolink | rlc-410w_firmware | * | |
reolink | rlc-410w | - | |
reolink | c1_pro_firmware | * | |
reolink | c1_pro | - | |
reolink | c2_pro_firmware | * | |
reolink | c2_pro | - | |
reolink | rlc-422w_firmware | * | |
reolink | rlc-422w | - | |
reolink | rlc-511w_firmware | * | |
reolink | rlc-511w | - |
{ "cisaActionDue": "2025-01-08", "cisaExploitAdd": "2024-12-18", "cisaRequiredAction": "The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.", "cisaVulnerabilityName": "Reolink Multiple IP Cameras OS Command Injection Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:reolink:rlc-410w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E2B849F-7B64-4F91-AB7E-F30E6C985E82", "versionEndIncluding": "1.0.227", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:reolink:rlc-410w:-:*:*:*:*:*:*:*", "matchCriteriaId": "260FB388-A221-4900-92FB-FAB90529647D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:reolink:c1_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "194BCD5A-FD4D-4033-9B01-0F4265FD457F", "versionEndIncluding": "1.0.227", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:reolink:c1_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "74E8E50D-04C9-4E55-BEF3-529DE454D246", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:reolink:c2_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6264361B-DDB6-4ED3-AAD4-3720C61F4252", "versionEndIncluding": "1.0.227", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:reolink:c2_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "4772378F-9C3C-4922-A881-ED97FD146E99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:reolink:rlc-422w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35B08D45-0987-4776-873A-E2F96953CC9B", "versionEndIncluding": "1.0.227", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:reolink:rlc-422w:-:*:*:*:*:*:*:*", "matchCriteriaId": "32CC3B56-E72B-40AB-8B61-1CDEA37EEC26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:reolink:rlc-511w_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C88B6DF-E0A7-4681-9037-70BE3D6EA74D", "versionEndIncluding": "1.0.227", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:reolink:rlc-511w:-:*:*:*:*:*:*:*", "matchCriteriaId": "E71BC51D-7C0F-4FDE-9B7E-020B6338644F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the \"TestEmail\" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field." }, { "lang": "es", "value": "En los dispositivos Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W y RLC-511W hasta la versi\u00f3n 1.0.227, un administrador autenticado puede usar la funcionalidad \"TestEmail\" para inyectar y ejecutar comandos del Sistema Operativo como root, como es demostrado por los metacaracteres shell en el campo addr1." } ], "id": "CVE-2019-11001", "lastModified": "2025-03-14T17:49:32.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2019-04-08T17:29:00.590", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "Broken Link" ], "url": "https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "Broken Link" ], "url": "https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
var-201904-1024
Vulnerability from variot
On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field. plural Reolink The product includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Reolink Digital Technology RLC-410W is an IP camera produced by Reolink Digital Technology Company in Hong Kong, China. There are security vulnerabilities in several Reolink products. Attackers use the 'TestEmail' function to exploit this vulnerability to inject and execute operating system commands with root privileges. The following products and versions are affected: Reolink RLC-410W 1.0.227 and earlier; C1 Pro 1.0.227 and earlier; C2 Pro 1.0.227 and earlier; RLC-422W 1.0.227 and earlier; RLC-511W 1.0 .227 and earlier versions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-1024", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "rlc-422w", "scope": "lte", "trust": 1.0, "vendor": "reolink", "version": "1.0.227" }, { "model": "rlc-511w", "scope": "lte", "trust": 1.0, "vendor": "reolink", "version": "1.0.227" }, { "model": "rlc-410w", "scope": "lte", "trust": 1.0, "vendor": "reolink", "version": "1.0.227" }, { "model": "c1 pro", "scope": "lte", "trust": 1.0, "vendor": "reolink", "version": "1.0.227" }, { "model": "c2 pro", "scope": "lte", "trust": 1.0, "vendor": "reolink", "version": "1.0.227" }, { "model": "c1 pro", "scope": "lte", "trust": 0.8, "vendor": "reolink digital", "version": "1.0.227" }, { "model": "c2 pro", "scope": "lte", "trust": 0.8, "vendor": "reolink digital", "version": "1.0.227" }, { "model": "rlc-410w", "scope": "lte", "trust": 0.8, "vendor": "reolink digital", "version": "1.0.227" }, { "model": "rlc-422w", "scope": "lte", "trust": 0.8, "vendor": "reolink digital", "version": "1.0.227" }, { "model": "rlc-511w", "scope": "lte", "trust": 0.8, "vendor": "reolink digital", "version": "1.0.227" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003252" }, { "db": "NVD", "id": "CVE-2019-11001" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:reolink:c1_pro_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:reolink:c2_pro_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:reolink:rlc-410w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:reolink:rlc-422w_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:reolink:rlc-511w_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003252" } ] }, "cve": "CVE-2019-11001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2019-11001", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-142604", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2019-11001", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-11001", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-11001", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201904-330", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-142604", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-142604" }, { "db": "JVNDB", "id": "JVNDB-2019-003252" }, { "db": "CNNVD", "id": "CNNVD-201904-330" }, { "db": "NVD", "id": "CVE-2019-11001" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the \"TestEmail\" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field. plural Reolink The product includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Reolink Digital Technology RLC-410W is an IP camera produced by Reolink Digital Technology Company in Hong Kong, China. There are security vulnerabilities in several Reolink products. Attackers use the \u0027TestEmail\u0027 function to exploit this vulnerability to inject and execute operating system commands with root privileges. The following products and versions are affected: Reolink RLC-410W 1.0.227 and earlier; C1 Pro 1.0.227 and earlier; C2 Pro 1.0.227 and earlier; RLC-422W 1.0.227 and earlier; RLC-511W 1.0 .227 and earlier versions", "sources": [ { "db": "NVD", "id": "CVE-2019-11001" }, { "db": "JVNDB", "id": "JVNDB-2019-003252" }, { "db": "VULHUB", "id": "VHN-142604" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-11001", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2019-003252", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201904-330", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-142604", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142604" }, { "db": "JVNDB", "id": "JVNDB-2019-003252" }, { "db": "CNNVD", "id": "CNNVD-201904-330" }, { "db": "NVD", "id": "CVE-2019-11001" } ] }, "id": "VAR-201904-1024", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-142604" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:33:56.480000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://reolink.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003252" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-142604" }, { "db": "JVNDB", "id": "JVNDB-2019-003252" }, { "db": "NVD", "id": "CVE-2019-11001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.vdoo.com/blog/working-with-the-community-%e2%80%93-significant-vulnerabilities-in-reolink-cameras/" }, { "trust": 1.7, "url": "https://github.com/mcw0/poc/blob/master/reolink-ipc-rce.py" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11001" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11001" } ], "sources": [ { "db": "VULHUB", "id": "VHN-142604" }, { "db": "JVNDB", "id": "JVNDB-2019-003252" }, { "db": "CNNVD", "id": "CNNVD-201904-330" }, { "db": "NVD", "id": "CVE-2019-11001" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-142604" }, { "db": "JVNDB", "id": "JVNDB-2019-003252" }, { "db": "CNNVD", "id": "CNNVD-201904-330" }, { "db": "NVD", "id": "CVE-2019-11001" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-04-08T00:00:00", "db": "VULHUB", "id": "VHN-142604" }, { "date": "2019-05-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003252" }, { "date": "2019-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-330" }, { "date": "2019-04-08T17:29:00.590000", "db": "NVD", "id": "CVE-2019-11001" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-04-09T00:00:00", "db": "VULHUB", "id": "VHN-142604" }, { "date": "2019-05-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003252" }, { "date": "2019-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-330" }, { "date": "2024-11-21T04:20:19.820000", "db": "NVD", "id": "CVE-2019-11001" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-330" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Reolink In product OS Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003252" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-330" } ], "trust": 0.6 } }
CVE-2019-11001 (GCVE-0-2019-11001)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/ | x_refsource_MISC | |
https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:15.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2019-11001", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-21T04:56:16.128440Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-12-18", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-11001" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:06.198Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2024-12-18T00:00:00+00:00", "value": "CVE-2019-11001 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the \"TestEmail\" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-08T17:00:21.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-11001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the \"TestEmail\" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/", "refsource": "MISC", "url": "https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/" }, { "name": "https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py", "refsource": "MISC", "url": "https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11001", "datePublished": "2019-04-08T17:00:21.000Z", "dateReserved": "2019-04-08T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:06.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }