CVE-2025-56799
- EPSS 5.97%
- Veröffentlicht 21.10.2025 00:00:00
- Zuletzt bearbeitet 17.11.2025 12:46:33
Reolink desktop application 8.18.12 contains a command injection vulnerability in its scheduled cache-clearing mechanism via a crafted folder name. NOTE: this is disputed by the Supplier because a crafted folder name would arise only if the local use...
CVE-2025-56800
- EPSS 0.05%
- Veröffentlicht 21.10.2025 00:00:00
- Zuletzt bearbeitet 17.11.2025 12:46:26
Reolink desktop application 8.18.12 contains a vulnerability in its local authentication mechanism. The application implements lock screen password logic entirely on the client side using JavaScript within an Electron resource file. Because the passw...
CVE-2025-56801
- EPSS 0.03%
- Veröffentlicht 21.10.2025 00:00:00
- Zuletzt bearbeitet 17.11.2025 12:46:15
The Reolink Desktop Application 8.18.12 contains hardcoded credentials as the Initialization Vector (IV) in its AES-CFB encryption implementation allowing attackers with access to the application environment to reliably decrypt encrypted configuratio...
CVE-2025-56802
- EPSS 0.03%
- Veröffentlicht 21.10.2025 00:00:00
- Zuletzt bearbeitet 17.11.2025 16:04:32
The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CV...
CVE-2025-55619
- EPSS 0.09%
- Veröffentlicht 22.08.2025 00:00:00
- Zuletzt bearbeitet 28.08.2025 13:34:45
Reolink v4.54.0.4.20250526 was discovered to contain a hardcoded encryption key and initialization vector. An attacker can leverage this vulnerability to decrypt access tokens and web session tokens stored inside the app via reverse engineering.
CVE-2025-55620
- EPSS 0.03%
- Veröffentlicht 22.08.2025 00:00:00
- Zuletzt bearbeitet 28.08.2025 13:31:24
A cross-site scripting (XSS) vulnerability in the valuateJavascript() function of Reolink v4.54.0.4.20250526 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
CVE-2025-55621
- EPSS 0.05%
- Veröffentlicht 22.08.2025 00:00:00
- Zuletzt bearbeitet 02.10.2025 01:58:50
An Insecure Direct Object Reference (IDOR) vulnerability in Reolink v4.54.0.4.20250526 allows unauthorized attackers to access and download other users' profile photos via a crafted URL. NOTE: this is disputed by the Supplier because it is intentiona...
CVE-2025-55622
- EPSS 0.07%
- Veröffentlicht 22.08.2025 00:00:00
- Zuletzt bearbeitet 02.10.2025 01:38:52
Reolink v4.54.0.4.20250526 was discovered to contain a task hijacking vulnerability due to inappropriate taskAffinity settings. NOTE: this is disputed by the Supplier because it is intentional behavior to ensure a predictable user experience.
CVE-2025-55623
- EPSS 0.04%
- Veröffentlicht 22.08.2025 00:00:00
- Zuletzt bearbeitet 28.08.2025 13:24:29
An issue in the lock screen component of Reolink v4.54.0.4.20250526 allows attackers to bypass authentication via using an ADB (Android Debug Bridge).
CVE-2025-55624
- EPSS 0.05%
- Veröffentlicht 22.08.2025 00:00:00
- Zuletzt bearbeitet 28.08.2025 13:21:16
An intent redirection vulnerability in Reolink v4.54.0.4.20250526 allows unauthorized attackers to access internal functions or access non-public components.