CVE-2025-55629

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to change other users' passwords on Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell devices by manipulating the userName value. It affects all users of the vulnerable firmware version, potentially leading to account takeover and unauthorized access to video feeds and doorbell controls.

💻 Affected Systems

Products:
  • Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime
Versions: Firmware v3.0.0.4662_2503122283
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover allowing attackers to lock out legitimate users, access live video feeds, disable security alerts, and potentially compromise home security.

🟠

Likely Case

Attackers change passwords for targeted users, gaining unauthorized access to video doorbell functionality and potentially using this as an entry point for further attacks.

🟢

If Mitigated

Limited impact if strong network segmentation and monitoring are in place, though account compromise remains possible.

🌐 Internet-Facing: HIGH - These devices are typically internet-facing smart home devices accessible via mobile apps and cloud services.
🏢 Internal Only: MEDIUM - Attackers would need network access, but once inside, exploitation is straightforward.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires some understanding of API manipulation but no special tools. The vulnerability is documented with technical details in the reference link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Reolink for updated firmware version

Vendor Advisory: Not yet published - monitor Reolink security advisories

Restart Required: Yes

Instructions:

1. Log into Reolink app 2. Navigate to device settings 3. Check for firmware updates 4. Apply any available updates 5. Reboot device after update

🔧 Temporary Workarounds

Network Isolation

all

Isolate the video doorbell on a separate VLAN or network segment to limit attack surface

Disable Remote Access

all

Temporarily disable cloud/remote access features if not critically needed

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can communicate with the device
  • Monitor for unusual authentication attempts or password change requests

🔍 How to Verify

Check if Vulnerable:

Check firmware version in Reolink app: Device Settings > Device Information > Firmware Version

Check Version:

Not applicable - check via Reolink mobile app interface

Verify Fix Applied:

Verify firmware version is no longer v3.0.0.4662_2503122283 and test password change functionality

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful password change
  • Password change requests for different usernames from same source

Network Indicators:

  • Unusual API calls to password change endpoints
  • Traffic patterns suggesting username parameter manipulation

SIEM Query:

source="reolink-doorbell" AND (event="password_change" OR event="authentication") | stats count by src_ip, username

🔗 References

📤 Share & Export