CVE-2025-60856

Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity."
Configurations

No configuration.

History

21 Oct 2025, 13:15

Type Values Removed Values Added
Summary (en) Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. (en) Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity."

20 Oct 2025, 17:15

Type Values Removed Values Added
CWE CWE-306
CWE-922
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8

20 Oct 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-20 16:15

Updated : 2025-10-21 19:31


NVD link : CVE-2025-60856

Mitre link : CVE-2025-60856

CVE.ORG link : CVE-2025-60856


JSON object : View

Products Affected

No product.

CWE
CWE-306

Missing Authentication for Critical Function

CWE-922

Insecure Storage of Sensitive Information