{"vulnerability": "cve-2021-40411", "sightings": [{"uuid": "5cbd46e1-f1bb-4215-96f1-7f0af62ba052", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-40411", "type": "seen", "source": "https://t.me/cibsecurity/36491", "content": "\u203c CVE-2021-40411 \u203c\n\nAn OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [6] the dns_data-&gt;dns2 variable, that has the value of the dns2 parameter provided through the SetLocalLink API, is not validated properly. This would lead to an OS command injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-28T22:22:16.000000Z"}]}