CVE-2025-60856

6.8 MEDIUM

📋 TL;DR

The Reolink Video Doorbell WiFi DB_566128M5MP_W has an unsecured UART/serial console that allows physical attackers to gain root shell access and execute arbitrary commands. This affects users of this specific Reolink doorbell model who have devices accessible to attackers. The vendor disputes the vulnerability, citing password complexity requirements and physical access restrictions.

💻 Affected Systems

Products:
  • Reolink Video Doorbell WiFi DB_566128M5MP_W
Versions: All versions with exposed UART/serial interface
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vendor disputes vulnerability, claiming password complexity requirements exist. Physical access to device required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing installation of persistent malware, credential theft, network pivoting, and physical security bypass.

🟠

Likely Case

Local attacker with brief physical access gains root control, potentially disabling security features or extracting sensitive data.

🟢

If Mitigated

With proper physical security controls, risk is limited to authorized personnel with extended physical access.

🌐 Internet-Facing: LOW - Requires physical access to device, not remotely exploitable.
🏢 Internal Only: MEDIUM - Physical access needed, but insider threats or unauthorized visitors could exploit if devices are accessible.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires physical access and technical knowledge of UART/serial connections. No authentication needed once connected.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://reolink.com/download-center/

Restart Required: No

Instructions:

No official patch available. Vendor disputes vulnerability. Check vendor website for firmware updates that may address this.

🔧 Temporary Workarounds

Physical Security Hardening

all

Secure device in tamper-resistant enclosure to prevent physical access to UART ports

Disable Serial Console

all

If possible, disable UART/serial console in firmware configuration

🧯 If You Can't Patch

  • Deploy devices in physically secure locations with restricted access
  • Implement tamper detection and monitoring for physical access attempts

🔍 How to Verify

Check if Vulnerable:

Physically inspect device for exposed UART/serial pins. Connect with serial adapter and check if root shell is accessible without authentication.

Check Version:

Check firmware version through Reolink mobile app or web interface. No specific command available.

Verify Fix Applied:

After applying any firmware updates, test serial console access to verify authentication is required.

📡 Detection & Monitoring

Log Indicators:

  • Serial console access logs (if available)
  • Unexpected reboots or configuration changes

Network Indicators:

  • Unusual network traffic from device after physical access

SIEM Query:

Search for device configuration changes without corresponding authorized maintenance events

🔗 References

📤 Share & Export