CVE-2025-55625

6.3 MEDIUM

📋 TL;DR

An open redirect vulnerability in Reolink firmware allows attackers to craft URLs that redirect users to malicious websites. This affects users of Reolink devices running vulnerable firmware versions. The vendor disputes this as a vulnerability, claiming the behavior is intentional for Alexa integration.

💻 Affected Systems

Products:
  • Reolink cameras and NVRs
Versions: v4.54.0.4.20250526 and potentially earlier versions
Operating Systems: Reolink firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vendor disputes this as a vulnerability, claiming redirect functionality is intentional for Alexa integration. All devices with vulnerable firmware are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into visiting phishing sites that steal credentials or deliver malware, potentially leading to account compromise or system infection.

🟠

Likely Case

Attackers could use crafted links in phishing campaigns to redirect users to malicious sites, though effectiveness depends on user interaction.

🟢

If Mitigated

With proper user education and URL filtering, the impact is limited to failed phishing attempts with minimal damage.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking a crafted link). No authentication is needed to trigger the redirect.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not applicable - vendor disputes vulnerability

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available as vendor disputes this is a vulnerability. Monitor for future firmware updates that may address the issue.

🔧 Temporary Workarounds

User Education and URL Filtering

all

Educate users about phishing risks and implement URL filtering at network perimeter

Disable Unnecessary Features

Reolink devices

If Alexa integration is not needed, consider disabling related features in device settings

🧯 If You Can't Patch

  • Implement network-level URL filtering to block malicious redirects
  • Use web application firewalls to detect and block open redirect patterns

🔍 How to Verify

Check if Vulnerable:

Test with crafted URLs containing redirect parameters to external domains

Check Version:

Check firmware version in Reolink device web interface or mobile app

Verify Fix Applied:

Verify that redirects only go to approved domains and external redirects are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in web server logs
  • Multiple failed redirect attempts

Network Indicators:

  • HTTP 302 redirects to external domains from Reolink devices
  • Suspicious URL parameters in requests

SIEM Query:

source="reolink" AND (url="*redirect=*" OR status=302) AND dest_ip NOT IN [approved_domains]

🔗 References

📤 Share & Export