An issue in the lock screen component of Reolink v4.54.0.4.20250526 allows attackers to bypass authentication via using an ADB (Android Debug Bridge).
References
Link | Resource |
---|---|
https://relieved-knuckle-264.notion.site/Reolink-App-lock-screen-Bypass-21a437003642804f869fde8535d18a3f?source=copy_link | Exploit Third Party Advisory |
Configurations
History
28 Aug 2025, 13:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://relieved-knuckle-264.notion.site/Reolink-App-lock-screen-Bypass-21a437003642804f869fde8535d18a3f?source=copy_link - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:reolink:reolink:4.54.0.4.20250526:*:*:*:*:android:*:* | |
First Time |
Reolink reolink
Reolink |
|
Summary |
|
22 Aug 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CWE | CWE-288 |
22 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-22 17:15
Updated : 2025-08-28 13:24
NVD link : CVE-2025-55623
Mitre link : CVE-2025-55623
CVE.ORG link : CVE-2025-55623
JSON object : View
Products Affected
reolink
- reolink
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel