An OS command injection vulnerability exists in the device network settings functionality of reolink RLC-410W v3.0.0.136_20121102. At [1] or [2], based on DDNS type, the ddns->domain variable, that has the value of the domain parameter provided through the SetDdns API, is not validated properly. This would lead to an OS command injection. An attacker can send an HTTP request to trigger this vulnerability.
Use CWE-78, Reolink vendor hub and Rlc-410w Firmware product page to widen CVE-2021-40407 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2021-44419, CVE-2021-44418 and CVE-2021-44417 for nearby disclosures in the same product family.