id: CVE-2021-40150 info: name: Reolink E1 Zoom Camera - Information Disclosure author: For3stCo1d severity: medium description: | The web server of the E1 Zoom camera through 3.0.0.716 discloses its configuration via the /conf/ directory that is mapped to a publicly accessible path. An unauthenticated attacker can abuse this with network-level access to the camera to download the entire NGINX/FastCGI configurations. reference: - https://dl.packetstormsecurity.net/2206-exploits/reolinke1config-disclose.txt - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-40150.txt - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40150 classification: cve-id: CVE-2021-40150 metadata: verified: true shodan-query: http.title:"Reolink" tags: cve,cve2021,reolink,camera,exposure,iot requests: - method: GET path: - "{{BaseURL}}/conf/nginx.conf" matchers-condition: and matchers: - type: word words: - "server" - "listen" - "fastcgi" condition: and - type: status status: - 200