VYPR

Reolink

by Reolink

CVEs (7)

  • CVE-2025-55622Aug 22, 2025
    risk 0.00cvss epss 0.00

    Reolink v4.54.0.4.20250526 was discovered to contain a task hijacking vulnerability due to inappropriate taskAffinity settings. NOTE: this is disputed by the Supplier because it is intentional behavior to ensure a predictable user experience.

  • CVE-2025-55620Aug 22, 2025
    risk 0.00cvss epss 0.00

    A cross-site scripting (XSS) vulnerability in the valuateJavascript() function of Reolink v4.54.0.4.20250526 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.

  • CVE-2025-55625Aug 22, 2025
    risk 0.00cvss epss 0.00

    An open redirect vulnerability in Reolink v4.54.0.4.20250526 allows attackers to redirect users to a malicious site via a crafted URL. NOTE: this is disputed by the Supplier because it is intentional behavior that supports redirection to Alexa URLs, which are not guaranteed to remain at the same domain indefinitely.

  • CVE-2025-55621Aug 22, 2025
    risk 0.00cvss epss 0.00

    An Insecure Direct Object Reference (IDOR) vulnerability in Reolink v4.54.0.4.20250526 allows unauthorized attackers to access and download other users' profile photos via a crafted URL. NOTE: this is disputed by the Supplier because it is intentional behavior; the photos are part of a social platform on which users expect to find one another.

  • CVE-2025-55623Aug 22, 2025
    risk 0.00cvss epss 0.00

    An issue in the lock screen component of Reolink v4.54.0.4.20250526 allows attackers to bypass authentication via using an ADB (Android Debug Bridge).

  • CVE-2025-55624Aug 22, 2025
    risk 0.00cvss epss 0.00

    An intent redirection vulnerability in Reolink v4.54.0.4.20250526 allows unauthorized attackers to access internal functions or access non-public components.

  • CVE-2025-55619Aug 22, 2025
    risk 0.00cvss epss 0.00

    Reolink v4.54.0.4.20250526 was discovered to contain a hardcoded encryption key and initialization vector. An attacker can leverage this vulnerability to decrypt access tokens and web session tokens stored inside the app via reverse engineering.