CVE-2019-11001
08.04.2019, 17:29
On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
Vendor | Product | Version |
---|---|---|
reolink | rlc-410w_firmware | 𝑥 ≤ 1.0.227 |
reolink | c1_pro_firmware | 𝑥 ≤ 1.0.227 |
reolink | c2_pro_firmware | 𝑥 ≤ 1.0.227 |
reolink | rlc-422w_firmware | 𝑥 ≤ 1.0.227 |
reolink | rlc-511w_firmware | 𝑥 ≤ 1.0.227 |
𝑥
= Vulnerable software versions
References