CVE-2021-44382
📋 TL;DR
A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests to the cgiserver.cgi JSON parser. This affects Reolink RLC-410W v3.0.0.136_20121102 firmware users with internet-exposed cameras.
💻 Affected Systems
- Reolink RLC-410W
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Persistent device reboots causing extended camera downtime, potentially disabling security monitoring systems.
Likely Case
Temporary camera unavailability requiring manual intervention to restore service.
If Mitigated
Minimal impact if cameras are behind firewalls with restricted HTTP access.
🎯 Exploit Status
Simple HTTP request with malformed JSON payload triggers vulnerability; exploit details published in Talos report.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later firmware versions (check Reolink support)
Vendor Advisory: https://support.reolink.com/hc/en-us/articles/
Restart Required: Yes
Instructions:
1. Log into camera web interface. 2. Navigate to System > Maintenance > Firmware Upgrade. 3. Upload latest firmware from Reolink website. 4. Wait for automatic reboot.
🔧 Temporary Workarounds
Network Segmentation
linuxRestrict HTTP access to camera management interface
iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
Disable Remote Access
allTurn off UPnP and port forwarding to prevent internet exposure
🧯 If You Can't Patch
- Place cameras behind firewall with strict inbound rules blocking port 80/443 from untrusted networks
- Implement network monitoring for repeated reboot patterns or malformed HTTP requests to cgiserver.cgi
🔍 How to Verify
Check if Vulnerable:
Check firmware version in camera web interface: System > Device Information > Firmware Version
Check Version:
curl -s http://camera-ip/cgi-bin/cgiserver.cgi?cmd=getDevInfo | grep Firmware
Verify Fix Applied:
Confirm firmware version is newer than v3.0.0.136_20121102 and test with crafted HTTP request (if safe)
📡 Detection & Monitoring
Log Indicators:
- Repeated device reboots
- HTTP 500 errors to cgiserver.cgi
- SetIrLights parameter errors
Network Indicators:
- HTTP POST requests to /cgi-bin/cgiserver.cgi with malformed JSON
- Unusual reboot patterns
SIEM Query:
source="camera_logs" AND ("reboot" OR "cgiserver.cgi" AND "500")