Learn about CVE-2021-44375, a vulnerability in Reolink RLC-410W v3.0.0.136_20121102 enabling attackers to trigger reboots via specially-crafted HTTP requests. Understand impacts, technical details, and mitigation steps.
Multiple denial of service vulnerabilities exist in Reolink RLC-410W v3.0.0.136_20121102, allowing attackers to trigger reboots via specially-crafted HTTP requests.
Understanding CVE-2021-44375
What is CVE-2021-44375?
CVE-2021-44375 discloses multiple denial of service vulnerabilities in the cgiserver.cgi JSON command parser functionality of Reolink RLC-410W v3.0.0.136_20121102.
The Impact of CVE-2021-44375
The vulnerability has a CVSS base score of 8.6 (High) with a high impact on availability. An attacker can execute a specially-crafted HTTP request to trigger the vulnerability, leading to a reboot.
Technical Details of CVE-2021-44375
Vulnerability Description
The flaw lies in the JSON command parser of Reolink RLC-410W v3.0.0.136_20121102, allowing for denial of service via HTTP requests.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Timely installation of security patches and updates is crucial in preventing exploitation of the vulnerability.