Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-44360 : What You Need to Know

Learn about CVE-2021-44360, a high-severity denial of service vulnerability in Reolink RLC-410W. Discover impacts, affected versions, and mitigation steps for protection.

A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of Reolink RLC-410W v3.0.0.136_20121102. An attacker can trigger a reboot via a specially-crafted HTTP request.

Understanding CVE-2021-44360

This CVE involves a denial of service vulnerability in a specific version of Reolink RLC-410W.

What is CVE-2021-44360?

The vulnerability stems from the cgiserver.cgi JSON command parser in Reolink RLC-410W v3.0.0.136_20121102, allowing an attacker to induce a reboot with a crafted HTTP request.

The Impact of CVE-2021-44360

The vulnerability has a CVSS base score of 8.6, indicating a high severity level due to the potential for a denial of service attack.

Technical Details of CVE-2021-44360

This section delves into the technical aspects of the CVE.

Vulnerability Description

The vulnerability in the cgiserver.cgi JSON command parser of Reolink RLC-410W v3.0.0.136_20121102 permits an attacker to cause a reboot with a malicious HTTP request.

Affected Systems and Versions

        Affected Product: Reolink RLC-410W v3.0.0.136_20121102
        Affected Version: All versions

Exploitation Mechanism

        Attack Complexity: Low
        Attack Vector: Network
        Privileges Required: None
        User Interaction: None
        Scope: Changed
        Availability Impact: High

Mitigation and Prevention

Mitigation steps to address the CVE.

Immediate Steps to Take

        Implement network-level controls to filter potentially malicious HTTP requests.
        Regularly monitor network traffic for any unusual patterns or activity.

Long-Term Security Practices

        Keep systems up to date with the latest security patches and firmware updates.
        Conduct regular security assessments and penetration testing to identify vulnerabilities.

Patching and Updates

        Apply patches provided by Reolink for the affected product version to address the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now