CVE-2025-55630

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers to determine valid user accounts on Reolink Smart Doorbell systems by analyzing differences in error messages during failed login attempts. Attackers can enumerate existing accounts, which is the first step in credential-based attacks. All users of the affected Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime running vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime
Versions: firmware v3.0.0.4662_2503122283
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific firmware version mentioned. Other Reolink products may have similar issues but are not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers enumerate all valid accounts, then conduct targeted password attacks leading to unauthorized access to video feeds, doorbell controls, and potentially home network infiltration.

🟠

Likely Case

Attackers identify valid accounts and conduct credential stuffing or brute force attacks against those specific accounts, potentially gaining unauthorized access to the doorbell system.

🟢

If Mitigated

Even with account enumeration, strong passwords and account lockout policies prevent successful authentication attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and involves simple login attempts with different usernames while observing error message differences.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

1. Check Reolink support for firmware updates. 2. If update available, download from official Reolink website. 3. Apply firmware update through Reolink app or web interface.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the doorbell device on a separate VLAN or network segment to limit exposure.

Access Control Lists

all

Implement firewall rules to restrict access to the doorbell's management interface.

🧯 If You Can't Patch

  • Implement strong, unique passwords for all accounts
  • Enable account lockout policies after failed attempts if supported

🔍 How to Verify

Check if Vulnerable:

Attempt login with invalid username and invalid password, then attempt with valid username and invalid password. Compare error messages for differences.

Check Version:

Check firmware version in Reolink mobile app under Device Settings > Device Information

Verify Fix Applied:

Repeat the verification test - both invalid username and valid username with wrong password should return identical error messages.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts with different usernames
  • Pattern of login attempts from single IP with varying usernames

Network Indicators:

  • Unusual authentication traffic to doorbell management interface
  • Multiple HTTP POST requests to login endpoint

SIEM Query:

source="doorbell_logs" AND event_type="authentication_failure" | stats count by username | where count > threshold

🔗 References

📤 Share & Export