Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-27589 | An OScommand injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [8] the devname variable, that has the value of the name parameter provided through the SetDevName API, is not validated properly. This would lead to an OS command injection. |
Tue, 15 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-04-15T19:20:06.800Z
Reserved: 2021-09-01T00:00:00.000Z
Link: CVE-2021-40412
Updated: 2024-08-04T02:44:09.477Z
Status : Modified
Published: 2022-01-28T20:15:11.827
Modified: 2024-11-21T06:24:04.823
Link: CVE-2021-40412
No data.
OpenCVE Enrichment
No data.
EUVD