On Reolink RLC-410W, C1 Pro, C2 Pro, RLC-422W, and RLC-511W devices through 1.0.227, an authenticated admin can use the "TestEmail" functionality to inject and run OS commands as root, as demonstrated by shell metacharacters in the addr1 field.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/mcw0/PoC/blob/master/Reolink-IPC-RCE.py | Exploit Third Party Advisory | 
| https://www.vdoo.com/blog/working-with-the-community-%E2%80%93-significant-vulnerabilities-in-reolink-cameras/ | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
Configuration 2 (hide)
| AND | 
            
            
 
  | 
    
Configuration 3 (hide)
| AND | 
            
            
 
  | 
    
Configuration 4 (hide)
| AND | 
            
            
 
  | 
    
Configuration 5 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2019-04-08 17:29
Updated : 2019-04-09 14:11
NVD link : CVE-2019-11001
Mitre link : CVE-2019-11001
CVE.ORG link : CVE-2019-11001
JSON object : View
Products Affected
                reolink
- c2_pro_firmware
 - c1_pro
 - c1_pro_firmware
 - rlc-511w_firmware
 - rlc-511w
 - rlc-422w
 - c2_pro
 - rlc-422w_firmware
 - rlc-410w
 - rlc-410w_firmware
 
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
