CVE-2021-44419
📋 TL;DR
A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots via specially crafted HTTP requests targeting the GetMdAlarm parameter. This affects Reolink RLC-410W v3.0.0.136_20121102 cameras exposed to network access.
💻 Affected Systems
- Reolink RLC-410W
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Persistent denial-of-service attacks causing repeated reboots, rendering the camera unavailable for surveillance purposes.
Likely Case
Temporary camera unavailability during reboot cycles, disrupting video monitoring.
If Mitigated
No impact if cameras are isolated from untrusted networks or patched.
🎯 Exploit Status
Exploitation requires sending a malformed HTTP request to the cgiserver.cgi endpoint with invalid GetMdAlarm parameter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later firmware versions (check Reolink for specific fixed version)
Vendor Advisory: https://www.reolink.com/security/
Restart Required: Yes
Instructions:
1. Log into Reolink camera web interface. 2. Navigate to System > Maintenance > Firmware Upgrade. 3. Upload latest firmware from Reolink website. 4. Wait for automatic reboot.
🔧 Temporary Workarounds
Network Segmentation
allIsolate cameras from untrusted networks using firewall rules.
Access Control Lists
allRestrict HTTP access to camera management interface to trusted IPs only.
🧯 If You Can't Patch
- Place cameras on isolated VLAN with no internet access
- Implement network monitoring for HTTP requests to cgiserver.cgi with malformed parameters
🔍 How to Verify
Check if Vulnerable:
Check firmware version in camera web interface under System > Device Information.
Check Version:
Check via web interface or use curl to query device information endpoint
Verify Fix Applied:
Confirm firmware version is newer than v3.0.0.136_20121102 and test with proof-of-concept exploit.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /cgi-bin/cgiserver.cgi with malformed GetMdAlarm parameter
- Unexpected device reboots
Network Indicators:
- HTTP POST requests to camera IP on port 80 with JSON payload containing GetMdAlarm parameter
SIEM Query:
sourceIP="camera_ip" AND destPort=80 AND httpMethod=POST AND uri="/cgi-bin/cgiserver.cgi" AND httpContent LIKE "%GetMdAlarm%"