### [CVE-2021-44366](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44366) ![](https://img.shields.io/static/v1?label=Product&message=RLC-410W&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=v3.0.0.136_20121102%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brightgreen) ### Description Multiple denial of service vulnerabilities exist in the cgiserver.cgi JSON command parser functionality of Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. An attacker can send an HTTP request to trigger this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1421 #### Github No PoCs found on GitHub currently.