CVE-2025-55623
📋 TL;DR
This vulnerability allows attackers to bypass the lock screen authentication on Reolink mobile apps by exploiting Android Debug Bridge (ADB) access. It affects users of Reolink v4.54.0.4.20250526 who have ADB enabled on their devices. Attackers with physical or remote ADB access can unlock the app without credentials.
💻 Affected Systems
- Reolink mobile application
📦 What is this software?
Reolink by Reolink
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain unauthorized access to live camera feeds, recorded footage, and device settings, potentially compromising privacy and security of monitored locations.
Likely Case
Local attackers with physical device access bypass lock screen to view camera feeds and settings without authorization.
If Mitigated
With ADB disabled and proper device security controls, impact is limited to physical device compromise scenarios.
🎯 Exploit Status
Requires ADB access to the device, which typically needs USB debugging enabled or network ADB configured.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to version after v4.54.0.4.20250526
Vendor Advisory: https://relieved-knuckle-264.notion.site/Reolink-App-lock-screen-Bypass-21a437003642804f869fde8535d18a3f?source=copy_link
Restart Required: No
Instructions:
1. Open Google Play Store 2. Search for Reolink app 3. Check for updates 4. Install latest version 5. Verify version is newer than v4.54.0.4.20250526
🔧 Temporary Workarounds
Disable ADB/Developer Options
AndroidTurn off Android Debug Bridge access to prevent exploitation vector
Go to Settings > Developer Options > Turn off 'USB debugging' and 'Wireless debugging'
🧯 If You Can't Patch
- Disable ADB/Developer Options on all Android devices running Reolink app
- Implement physical security controls to prevent unauthorized device access
🔍 How to Verify
Check if Vulnerable:
Check Reolink app version in app settings. If version is exactly v4.54.0.4.20250526 and ADB is enabled, device is vulnerable.
Check Version:
Open Reolink app > Settings > About > Check version number
Verify Fix Applied:
Update app through Play Store and confirm version is newer than v4.54.0.4.20250526
📡 Detection & Monitoring
Log Indicators:
- ADB connection attempts to device
- Reolink app authentication bypass events
Network Indicators:
- ADB protocol traffic (default port 5555) to Android devices
SIEM Query:
source="android_logs" AND (process="adbd" OR message="*ADB*" OR message="*debugging*")