CVE-2025-55624
📋 TL;DR
This CVE describes an intent redirection vulnerability in Reolink mobile app version 4.54.0.4.20250526 that allows attackers to bypass intended restrictions and access internal app functions or non-public components. This affects users running the vulnerable version of the Reolink mobile application on Android devices.
💻 Affected Systems
- Reolink mobile application
📦 What is this software?
Reolink by Reolink
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive internal app functions, potentially leading to data leakage, unauthorized actions within the app, or chaining with other vulnerabilities for more severe impact.
Likely Case
Unauthorized access to non-public app components, potentially exposing internal functionality or data that should be restricted.
If Mitigated
Limited impact with proper app sandboxing and security controls in place, potentially only exposing non-sensitive internal functions.
🎯 Exploit Status
Requires user interaction (clicking malicious link) and knowledge of internal app components. No public exploit code available at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to latest version from Google Play Store
Vendor Advisory: No official vendor advisory found
Restart Required: No
Instructions:
1. Open Google Play Store on Android device. 2. Search for 'Reolink'. 3. If update is available, tap 'Update'. 4. Ensure app version is newer than v4.54.0.4.20250526.
🔧 Temporary Workarounds
Disable app links handling
androidPrevent the Reolink app from handling external links by default
Settings > Apps > Reolink > Open by default > Clear defaults
🧯 If You Can't Patch
- Uninstall the vulnerable version and use alternative methods to access Reolink cameras
- Use web interface instead of mobile app if available
🔍 How to Verify
Check if Vulnerable:
Check app version in Settings > Apps > Reolink > App info. If version is exactly v4.54.0.4.20250526, you are vulnerable.
Check Version:
adb shell dumpsys package com.reolink.app | grep versionName
Verify Fix Applied:
Update app via Google Play Store and verify version is newer than v4.54.0.4.20250526.
📡 Detection & Monitoring
Log Indicators:
- Unusual intent/activity launches in Android logs
- Unexpected deep link handling by Reolink app
Network Indicators:
- Unusual outbound connections from Reolink app following link clicks
SIEM Query:
No specific SIEM query available for mobile app vulnerabilities