CVE-2025-55624

5.3 MEDIUM

📋 TL;DR

This CVE describes an intent redirection vulnerability in Reolink mobile app version 4.54.0.4.20250526 that allows attackers to bypass intended restrictions and access internal app functions or non-public components. This affects users running the vulnerable version of the Reolink mobile application on Android devices.

💻 Affected Systems

Products:
  • Reolink mobile application
Versions: v4.54.0.4.20250526
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the Android version of the Reolink mobile app. The vulnerability is in how the app handles intents/URL schemes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive internal app functions, potentially leading to data leakage, unauthorized actions within the app, or chaining with other vulnerabilities for more severe impact.

🟠

Likely Case

Unauthorized access to non-public app components, potentially exposing internal functionality or data that should be restricted.

🟢

If Mitigated

Limited impact with proper app sandboxing and security controls in place, potentially only exposing non-sensitive internal functions.

🌐 Internet-Facing: MEDIUM - Requires user interaction with malicious content but could be delivered via phishing or compromised websites.
🏢 Internal Only: LOW - Primarily affects mobile app users rather than internal network infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (clicking malicious link) and knowledge of internal app components. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version from Google Play Store

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

1. Open Google Play Store on Android device. 2. Search for 'Reolink'. 3. If update is available, tap 'Update'. 4. Ensure app version is newer than v4.54.0.4.20250526.

🔧 Temporary Workarounds

Disable app links handling

android

Prevent the Reolink app from handling external links by default

Settings > Apps > Reolink > Open by default > Clear defaults

🧯 If You Can't Patch

  • Uninstall the vulnerable version and use alternative methods to access Reolink cameras
  • Use web interface instead of mobile app if available

🔍 How to Verify

Check if Vulnerable:

Check app version in Settings > Apps > Reolink > App info. If version is exactly v4.54.0.4.20250526, you are vulnerable.

Check Version:

adb shell dumpsys package com.reolink.app | grep versionName

Verify Fix Applied:

Update app via Google Play Store and verify version is newer than v4.54.0.4.20250526.

📡 Detection & Monitoring

Log Indicators:

  • Unusual intent/activity launches in Android logs
  • Unexpected deep link handling by Reolink app

Network Indicators:

  • Unusual outbound connections from Reolink app following link clicks

SIEM Query:

No specific SIEM query available for mobile app vulnerabilities

🔗 References

📤 Share & Export