Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Reolink Video Doorbell WiFi DB_566128M5MP_W performs insufficient validation of firmware update signatures. This allows attackers to load malicious firmware images, resulting in arbitrary code execution with root privileges. | Reolink Video Doorbell WiFi DB_566128M5MP_W performs insufficient validation of firmware update signatures. This allows attackers to load malicious firmware images, resulting in arbitrary code execution with root privileges. NOTE: this is disputed by the Supplier because the integrity of updates is instead assured via a "private encryption algorithm" and other "tamper-proof verification." |
| First Time appeared |
Reolink
Reolink video Doorbell |
|
| Vendors & Products |
Reolink
Reolink video Doorbell |
Thu, 16 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Thu, 16 Oct 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Reolink Video Doorbell WiFi DB_566128M5MP_W performs insufficient validation of firmware update signatures. This allows attackers to load malicious firmware images, resulting in arbitrary code execution with root privileges. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-21T12:50:21.339Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-60855
Updated: 2025-10-16T19:39:26.380Z
Status : Deferred
Published: 2025-10-16T19:15:33.367
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-60855
No data.
OpenCVE Enrichment
Updated: 2025-10-21T13:09:20Z