VYPR

Video Doorbell Wi-Fi DB_566128M5MP_W

by Reolink

CVEs (3)

  • CVE-2025-60858HigOct 28, 2025
    risk 0.49cvss 7.5epss 0.00

    Reolink Video Doorbell Wi-Fi DB_566128M5MP_W stores and transmits DDNS credentials in plaintext within its configuration and update scripts, allowing attackers to intercept or extract sensitive information.

  • CVE-2025-60856MedOct 20, 2025
    risk 0.44cvss 6.8epss 0.00

    Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity."

  • CVE-2025-60855MedOct 16, 2025
    risk 0.33cvss 5.1epss 0.00

    Reolink Video Doorbell WiFi DB_566128M5MP_W performs insufficient validation of firmware update signatures. This allows attackers to load malicious firmware images, resulting in arbitrary code execution with root privileges. NOTE: this is disputed by the Supplier because the integrity of updates is instead assured via a "private encryption algorithm" and other "tamper-proof verification."