CVE-2025-60855

5.1 MEDIUM

📋 TL;DR

CVE-2025-60855 is a firmware validation vulnerability in Reolink Video Doorbell WiFi DB_566128M5MP_W that allows attackers to bypass signature checks and install malicious firmware. This leads to arbitrary code execution with root privileges, potentially compromising the entire device. The vulnerability affects users of this specific Reolink video doorbell model.

💻 Affected Systems

Products:
  • Reolink Video Doorbell WiFi DB_566128M5MP_W
Versions: All versions prior to patched firmware
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the firmware update mechanism. The vendor disputes the finding, claiming their 'private encryption algorithm' provides sufficient protection.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to disable security features, access video feeds, use the device as a network pivot point, or join botnets.

🟠

Likely Case

Attackers could install backdoored firmware to persistently monitor video feeds, disable doorbell functionality, or use the device for local network attacks.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to the compromised device without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to the device and ability to trigger firmware updates. The vendor dispute suggests exploitation may be more complex than initially reported.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Reolink Download Center for latest firmware

Vendor Advisory: https://reolink.com/download-center/

Restart Required: Yes

Instructions:

1. Visit Reolink Download Center. 2. Download latest firmware for DB_566128M5MP_W. 3. Upload firmware via Reolink app/web interface. 4. Device will reboot automatically.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate video doorbell on separate VLAN with restricted internet access

Disable Remote Firmware Updates

all

Configure device to only accept manual firmware updates

🧯 If You Can't Patch

  • Physically disconnect device from network if not essential
  • Implement strict firewall rules blocking all inbound connections to the device

🔍 How to Verify

Check if Vulnerable:

Check current firmware version in Reolink app settings. If not latest version from Reolink Download Center, device may be vulnerable.

Check Version:

Check via Reolink mobile app: Device Settings > System Information > Firmware Version

Verify Fix Applied:

After updating, verify firmware version matches latest available on Reolink Download Center.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected firmware update attempts
  • Device reboots without user action
  • Unusual network traffic from device

Network Indicators:

  • Firmware download from non-Reolink sources
  • Unusual outbound connections from device

SIEM Query:

source="reolink" AND (event="firmware_update" OR event="system_reboot")

🔗 References

📤 Share & Export