// For flags

CVE-2019-11001

Reolink Multiple IP Cameras OS Command Injection Vulnerability

Severity Score

7.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.

En los dispositivos Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W y RLC-511W hasta la versiĆ³n 1.0.227, un administrador autenticado puede usar la funcionalidad "TestEmail" para inyectar y ejecutar comandos del Sistema Operativo como root, como es demostrado por los metacaracteres shell en el campo addr1.

Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W IP cameras contain an authenticated OS command injection vulnerability. This vulnerability allows an authenticated admin to use the "TestEmail" functionality to inject and run OS commands as root.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-04-08 CVE Reserved
  • 2019-04-08 CVE Published
  • 2024-12-18 Exploited in Wild
  • 2024-12-19 EPSS Updated
  • 2024-12-21 CVE Updated
  • 2024-12-21 First Exploit
  • 2025-01-08 KEV Due Date
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Reolink
Search vendor "Reolink"
Rlc-410w Firmware
Search vendor "Reolink" for product "Rlc-410w Firmware"
<= 1.0.227
Search vendor "Reolink" for product "Rlc-410w Firmware" and version " <= 1.0.227"
-
Affected
in Reolink
Search vendor "Reolink"
Rlc-410w
Search vendor "Reolink" for product "Rlc-410w"
--
Safe
Reolink
Search vendor "Reolink"
C1 Pro Firmware
Search vendor "Reolink" for product "C1 Pro Firmware"
<= 1.0.227
Search vendor "Reolink" for product "C1 Pro Firmware" and version " <= 1.0.227"
-
Affected
in Reolink
Search vendor "Reolink"
C1 Pro
Search vendor "Reolink" for product "C1 Pro"
--
Safe
Reolink
Search vendor "Reolink"
C2 Pro Firmware
Search vendor "Reolink" for product "C2 Pro Firmware"
<= 1.0.227
Search vendor "Reolink" for product "C2 Pro Firmware" and version " <= 1.0.227"
-
Affected
in Reolink
Search vendor "Reolink"
C2 Pro
Search vendor "Reolink" for product "C2 Pro"
--
Safe
Reolink
Search vendor "Reolink"
Rlc-422w Firmware
Search vendor "Reolink" for product "Rlc-422w Firmware"
<= 1.0.227
Search vendor "Reolink" for product "Rlc-422w Firmware" and version " <= 1.0.227"
-
Affected
in Reolink
Search vendor "Reolink"
Rlc-422w
Search vendor "Reolink" for product "Rlc-422w"
--
Safe
Reolink
Search vendor "Reolink"
Rlc-511w Firmware
Search vendor "Reolink" for product "Rlc-511w Firmware"
<= 1.0.227
Search vendor "Reolink" for product "Rlc-511w Firmware" and version " <= 1.0.227"
-
Affected
in Reolink
Search vendor "Reolink"
Rlc-511w
Search vendor "Reolink" for product "Rlc-511w"
--
Safe