Learn about CVE-2021-44396, a high severity denial of service vulnerability in Reolink RLC-410W v3.0.0.136_20121102. Find out its impact, affected systems, exploitation mechanism, and mitigation steps.
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of Reolink RLC-410W v3.0.0.136_20121102. An attacker can trigger a reboot by sending a specially-crafted HTTP request.
Understanding CVE-2021-44396
What is CVE-2021-44396?
This CVE describes a denial of service vulnerability in the JSON command parser of Reolink RLC-410W v3.0.0.136_20121102, where an attacker can exploit a specially-crafted HTTP request to cause a reboot.
The Impact of CVE-2021-44396
The vulnerability has a CVSS base score of 8.6, indicating a high severity issue. It can lead to a denial of service with a significant impact on availability, requiring no privileges for exploitation.
Technical Details of CVE-2021-44396
Vulnerability Description
The vulnerability exists in the cgiserver.cgi JSON command parser of Reolink RLC-410W v3.0.0.136_20121102, allowing an attacker to trigger a reboot through a malicious HTTP request.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Ensure to apply any patches or updates provided by Reolink to address and mitigate the vulnerability.