Reolink E1 Zoom Camera <=3.0.0.716 - Private Key Disclosure
ID: CVE-2021-40149
Severity: medium
Author: For3stCo1d
Tags: cve2021,cve,exposure,unauth,packetstorm,reolink,camera,iot
Description
Section titled “Description”Reolink E1 Zoom Camera versions 3.0.0.716 and below suffer from a private key (RSA) disclosure vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2021-40149
info: name: Reolink E1 Zoom Camera <=3.0.0.716 - Private Key Disclosure author: For3stCo1d severity: medium description: | Reolink E1 Zoom Camera versions 3.0.0.716 and below suffer from a private key (RSA) disclosure vulnerability. impact: | An attacker can obtain the private key, potentially leading to unauthorized access and compromise of the camera. remediation: | Upgrade the Reolink E1 Zoom Camera to a version higher than 3.0.0.716 to mitigate the vulnerability. reference: - https://dl.packetstormsecurity.net/2206-exploits/reolinke1key-disclose.txt - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-40149.txt - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40149 - http://packetstormsecurity.com/files/167407/Reolink-E1-Zoom-Camera-3.0.0.716-Private-Key-Disclosure.html - https://github.com/MrTuxracer/advisories classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 5.9 cve-id: CVE-2021-40149 cwe-id: CWE-552 epss-score: 0.00942 epss-percentile: 0.8308 cpe: cpe:2.3:h:reolink:e1_zoom:-:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: reolink product: e1_zoom shodan-query: http.title:"Reolink" fofa-query: title="reolink" google-query: intitle:"reolink" tags: cve2021,cve,exposure,unauth,packetstorm,reolink,camera,iot
http: - method: GET path: - "{{BaseURL}}/self.key"
matchers-condition: and matchers: - type: regex part: body regex: - '(?m)^-----BEGIN PRIVATE KEY-----'
- type: word part: header words: - "application/json" - "application/html" condition: and negative: true
- type: status status: - 200# digest: 4a0a00473045022100d9121d4c210e8c3486c90b46a84d2c0755a5b7ef30ddea6e2d76a28c60c500a40220762e9b7a8f9eb18d39ce2c1ef7e09a03c7a65880ced46293da00d0fefcd8f360:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-40149.yaml"