CVE-2021-44362
📋 TL;DR
This vulnerability allows remote attackers to cause a denial of service by sending a specially crafted HTTP request to the Reolink RLC-410W camera's cgiserver.cgi JSON parser. The malformed SetCloudSchedule parameter triggers a device reboot. This affects users of Reolink RLC-410W cameras running vulnerable firmware.
💻 Affected Systems
- Reolink RLC-410W
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Persistent device unavailability through repeated exploitation, disrupting surveillance coverage and potentially enabling physical security breaches during downtime.
Likely Case
Temporary camera reboot causing surveillance gaps, requiring manual intervention to restore functionality.
If Mitigated
Minimal impact with proper network segmentation and access controls preventing external exploitation attempts.
🎯 Exploit Status
Exploitation requires sending a malformed HTTP request with a non-object SetCloudSchedule parameter to the cgiserver.cgi endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Reolink for updated firmware
Vendor Advisory: https://reolink.com/support/security-advisories/
Restart Required: Yes
Instructions:
1. Check current firmware version via camera web interface. 2. Download latest firmware from Reolink support site. 3. Upload firmware via web interface. 4. Reboot camera after update completes.
🔧 Temporary Workarounds
Network Segmentation
allIsolate cameras on separate VLAN without internet access
Access Control Lists
allRestrict HTTP access to camera management interface to trusted IPs only
🧯 If You Can't Patch
- Implement strict network segmentation to isolate cameras from untrusted networks
- Deploy web application firewall rules to block malformed JSON requests to cgiserver.cgi
🔍 How to Verify
Check if Vulnerable:
Check firmware version in camera web interface under Settings > System > Firmware
Check Version:
curl -s http://camera-ip/cgi-bin/cgiserver.cgi?cmd=getSystemInfo | grep version
Verify Fix Applied:
Verify firmware version matches or exceeds patched version after update
📡 Detection & Monitoring
Log Indicators:
- Unexpected device reboots
- HTTP requests to cgiserver.cgi with malformed JSON
Network Indicators:
- HTTP POST requests to /cgi-bin/cgiserver.cgi with SetCloudSchedule parameter
SIEM Query:
source="camera-logs" AND (event="reboot" OR uri="/cgi-bin/cgiserver.cgi")