CVE-2019-11001
Reolink Multiple IP Cameras OS Command Injection Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
YesDecision
Descriptions
On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
En los dispositivos Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W y RLC-511W hasta la versiĆ³n 1.0.227, un administrador autenticado puede usar la funcionalidad "TestEmail" para inyectar y ejecutar comandos del Sistema Operativo como root, como es demostrado por los metacaracteres shell en el campo addr1.
Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W IP cameras contain an authenticated OS command injection vulnerability. This vulnerability allows an authenticated admin to use the "TestEmail" functionality to inject and run OS commands as root.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2019-04-08 CVE Reserved
- 2019-04-08 CVE Published
- 2024-12-18 Exploited in Wild
- 2024-12-19 EPSS Updated
- 2024-12-21 CVE Updated
- 2024-12-21 First Exploit
- 2025-01-08 KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Reolink Search vendor "Reolink" | Rlc-410w Firmware Search vendor "Reolink" for product "Rlc-410w Firmware" | <= 1.0.227 Search vendor "Reolink" for product "Rlc-410w Firmware" and version " <= 1.0.227" | - |
Affected
| in | Reolink Search vendor "Reolink" | Rlc-410w Search vendor "Reolink" for product "Rlc-410w" | - | - |
Safe
|
Reolink Search vendor "Reolink" | C1 Pro Firmware Search vendor "Reolink" for product "C1 Pro Firmware" | <= 1.0.227 Search vendor "Reolink" for product "C1 Pro Firmware" and version " <= 1.0.227" | - |
Affected
| in | Reolink Search vendor "Reolink" | C1 Pro Search vendor "Reolink" for product "C1 Pro" | - | - |
Safe
|
Reolink Search vendor "Reolink" | C2 Pro Firmware Search vendor "Reolink" for product "C2 Pro Firmware" | <= 1.0.227 Search vendor "Reolink" for product "C2 Pro Firmware" and version " <= 1.0.227" | - |
Affected
| in | Reolink Search vendor "Reolink" | C2 Pro Search vendor "Reolink" for product "C2 Pro" | - | - |
Safe
|
Reolink Search vendor "Reolink" | Rlc-422w Firmware Search vendor "Reolink" for product "Rlc-422w Firmware" | <= 1.0.227 Search vendor "Reolink" for product "Rlc-422w Firmware" and version " <= 1.0.227" | - |
Affected
| in | Reolink Search vendor "Reolink" | Rlc-422w Search vendor "Reolink" for product "Rlc-422w" | - | - |
Safe
|
Reolink Search vendor "Reolink" | Rlc-511w Firmware Search vendor "Reolink" for product "Rlc-511w Firmware" | <= 1.0.227 Search vendor "Reolink" for product "Rlc-511w Firmware" and version " <= 1.0.227" | - |
Affected
| in | Reolink Search vendor "Reolink" | Rlc-511w Search vendor "Reolink" for product "Rlc-511w" | - | - |
Safe
|