CVE-2025-55627

5.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers to create accounts with elevated privileges on Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime devices. Attackers with existing access can escalate their privileges beyond intended levels. This affects users running the vulnerable firmware version.

💻 Affected Systems

Products:
  • Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime
Versions: firmware v3.0.0.4662_2503122283
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with the specific vulnerable firmware version. Requires attacker to have some level of authenticated access first.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise where attackers gain administrative control, potentially accessing video feeds, disabling security features, or using the device as a foothold into the network.

🟠

Likely Case

Attackers with initial access create administrative accounts to maintain persistent access, monitor video feeds, or modify device settings.

🟢

If Mitigated

Attackers remain limited to their original privilege level without ability to escalate or create new accounts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access first, then privilege escalation through account creation. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Reolink for updated firmware

Vendor Advisory: https://relieved-knuckle-264.notion.site/Account-Takeover-Create-Account-23c43700364280c2b0bddba94a9362ed

Restart Required: No

Instructions:

1. Log into Reolink app or web interface. 2. Navigate to device settings. 3. Check for firmware updates. 4. Apply any available updates. 5. Verify firmware version is no longer v3.0.0.4662_2503122283.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the doorbell device on a separate VLAN or network segment to limit lateral movement if compromised.

Access Control

all

Restrict network access to the device only from trusted IP addresses using firewall rules.

🧯 If You Can't Patch

  • Disable remote access features if not required
  • Monitor device logs for unusual account creation activity

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in Reolink app or web interface under device settings.

Check Version:

Check via Reolink mobile app: Device Settings > Device Information > Firmware Version

Verify Fix Applied:

Confirm firmware version has been updated to a version newer than v3.0.0.4662_2503122283.

📡 Detection & Monitoring

Log Indicators:

  • Unusual account creation events
  • Multiple failed login attempts followed by successful login
  • Administrative actions from non-admin accounts

Network Indicators:

  • Unusual network traffic patterns from the device
  • Connections to unexpected external IPs

SIEM Query:

device_type:"Reolink Doorbell" AND (event_type:"account_creation" OR privilege_level_changed)

🔗 References

📤 Share & Export