CVE-2025-55623

An issue in the lock screen component of Reolink v4.54.0.4.20250526 allows attackers to bypass authentication via using an ADB (Android Debug Bridge).
Configurations

Configuration 1 (hide)

cpe:2.3:a:reolink:reolink:4.54.0.4.20250526:*:*:*:*:android:*:*

History

28 Aug 2025, 13:24

Type Values Removed Values Added
References () https://relieved-knuckle-264.notion.site/Reolink-App-lock-screen-Bypass-21a437003642804f869fde8535d18a3f?source=copy_link - () https://relieved-knuckle-264.notion.site/Reolink-App-lock-screen-Bypass-21a437003642804f869fde8535d18a3f?source=copy_link - Exploit, Third Party Advisory
CPE cpe:2.3:a:reolink:reolink:4.54.0.4.20250526:*:*:*:*:android:*:*
First Time Reolink reolink
Reolink
Summary
  • (es) Un problema en el componente de pantalla de bloqueo de Reolink v4.54.0.4.20250526 permite a los atacantes eludir la autenticación mediante el uso de un ADB (Android Debug Bridge).

22 Aug 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CWE CWE-288

22 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-22 17:15

Updated : 2025-08-28 13:24


NVD link : CVE-2025-55623

Mitre link : CVE-2025-55623

CVE.ORG link : CVE-2025-55623


JSON object : View

Products Affected

reolink

  • reolink
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel