Reolink

Reolink

11 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 5.97%
  • Veröffentlicht 21.10.2025 00:00:00
  • Zuletzt bearbeitet 17.11.2025 12:46:33

Reolink desktop application 8.18.12 contains a command injection vulnerability in its scheduled cache-clearing mechanism via a crafted folder name. NOTE: this is disputed by the Supplier because a crafted folder name would arise only if the local use...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 21.10.2025 00:00:00
  • Zuletzt bearbeitet 17.11.2025 12:46:26

Reolink desktop application 8.18.12 contains a vulnerability in its local authentication mechanism. The application implements lock screen password logic entirely on the client side using JavaScript within an Electron resource file. Because the passw...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 21.10.2025 00:00:00
  • Zuletzt bearbeitet 17.11.2025 12:46:15

The Reolink Desktop Application 8.18.12 contains hardcoded credentials as the Initialization Vector (IV) in its AES-CFB encryption implementation allowing attackers with access to the application environment to reliably decrypt encrypted configuratio...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 21.10.2025 00:00:00
  • Zuletzt bearbeitet 17.11.2025 16:04:32

The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CV...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 22.08.2025 00:00:00
  • Zuletzt bearbeitet 28.08.2025 13:34:45

Reolink v4.54.0.4.20250526 was discovered to contain a hardcoded encryption key and initialization vector. An attacker can leverage this vulnerability to decrypt access tokens and web session tokens stored inside the app via reverse engineering.

Exploit
  • EPSS 0.03%
  • Veröffentlicht 22.08.2025 00:00:00
  • Zuletzt bearbeitet 28.08.2025 13:31:24

A cross-site scripting (XSS) vulnerability in the valuateJavascript() function of Reolink v4.54.0.4.20250526 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 22.08.2025 00:00:00
  • Zuletzt bearbeitet 02.10.2025 01:58:50

An Insecure Direct Object Reference (IDOR) vulnerability in Reolink v4.54.0.4.20250526 allows unauthorized attackers to access and download other users' profile photos via a crafted URL. NOTE: this is disputed by the Supplier because it is intentiona...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 22.08.2025 00:00:00
  • Zuletzt bearbeitet 02.10.2025 01:38:52

Reolink v4.54.0.4.20250526 was discovered to contain a task hijacking vulnerability due to inappropriate taskAffinity settings. NOTE: this is disputed by the Supplier because it is intentional behavior to ensure a predictable user experience.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 22.08.2025 00:00:00
  • Zuletzt bearbeitet 28.08.2025 13:24:29

An issue in the lock screen component of Reolink v4.54.0.4.20250526 allows attackers to bypass authentication via using an ADB (Android Debug Bridge).

Exploit
  • EPSS 0.05%
  • Veröffentlicht 22.08.2025 00:00:00
  • Zuletzt bearbeitet 28.08.2025 13:21:16

An intent redirection vulnerability in Reolink v4.54.0.4.20250526 allows unauthorized attackers to access internal functions or access non-public components.