Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity."
References
Configurations
No configuration.
History
21 Oct 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity." |
20 Oct 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-306 CWE-922 |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
20 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-20 16:15
Updated : 2025-10-21 19:31
NVD link : CVE-2025-60856
Mitre link : CVE-2025-60856
CVE.ORG link : CVE-2025-60856
JSON object : View
Products Affected
No product.
