TROYANOSYVIRUS
Voltar para CVEs

CVE-2019-11001

HIGHCISA KEV
7.2

Descricao

On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.

Detalhes CVE

Pontuacao CVSS v3.17.2
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosHIGH
Interacao do usuarioNONE
Publicado4/8/2019
Ultima modificacao11/6/2025
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorReolink
ProdutoMultiple IP Cameras
Nome da vulnerabilidadeReolink Multiple IP Cameras OS Command Injection Vulnerability
Data inclusao KEV2024-12-18
Prazo de remediacao2025-01-08
Uso em ransomwareUnknown

Produtos afetados

reolink:c1_proreolink:c1_pro_firmwarereolink:c2_proreolink:c2_pro_firmwarereolink:rlc-410wreolink:rlc-410w_firmwarereolink:rlc-422wreolink:rlc-422w_firmwarereolink:rlc-511wreolink:rlc-511w_firmware

Fraquezas (CWE)

CWE-78CWE-78

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.