CVE DATABASE / CVE-2021-40407
CVE-2021-40407
Reolink RLC-410W IP Camera OS Command Injection Vulnerability
Confirmed exploited in the wild. Added 2024-12-18.
Federal remediation due 2025-01-08.
Required action: The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization if a current mitigation is unavailable.
Summary
An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.
CVSS 3.1 breakdown
| Base score | 7.2 (HIGH) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| Attack vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | HIGH |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity | HIGH |
| Availability | HIGH |
Weakness type (CWE)
Affected products
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1424
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-40407
Data: NIST NVD + CISA KEV. NVD last modified 2025-11-03. Always verify against the vendor advisory before acting.