CVE-2019-11001
HIGH KEVReolink Rlc-410w Firmware < 1.0.227 - OS Command Injection
Title source: ruleDescription
On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
Scores
CVSS v3
7.2
EPSS
0.3837
EPSS Percentile
97.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2024-12-18
VulnCheck KEV
2024-12-18
InTheWild.io
2024-12-18
ENISA EUVD
EUVD-2019-2715
CWE
CWE-78
Status
published
Products (5)
reolink/c1_pro_firmware
< 1.0.227
reolink/c2_pro_firmware
< 1.0.227
reolink/rlc-410w_firmware
< 1.0.227
reolink/rlc-422w_firmware
< 1.0.227
reolink/rlc-511w_firmware
< 1.0.227
Published
Apr 08, 2019
KEV Added
Dec 18, 2024
Tracked Since
Feb 18, 2026