CVE-2025-60856
📋 TL;DR
The Reolink Video Doorbell WiFi DB_566128M5MP_W has an unsecured UART/serial console that allows physical attackers to gain root shell access and execute arbitrary commands. This affects users of this specific Reolink doorbell model who have devices accessible to attackers. The vendor disputes the vulnerability, citing password complexity requirements and physical access restrictions.
💻 Affected Systems
- Reolink Video Doorbell WiFi DB_566128M5MP_W
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing installation of persistent malware, credential theft, network pivoting, and physical security bypass.
Likely Case
Local attacker with brief physical access gains root control, potentially disabling security features or extracting sensitive data.
If Mitigated
With proper physical security controls, risk is limited to authorized personnel with extended physical access.
🎯 Exploit Status
Requires physical access and technical knowledge of UART/serial connections. No authentication needed once connected.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: https://reolink.com/download-center/
Restart Required: No
Instructions:
No official patch available. Vendor disputes vulnerability. Check vendor website for firmware updates that may address this.
🔧 Temporary Workarounds
Physical Security Hardening
allSecure device in tamper-resistant enclosure to prevent physical access to UART ports
Disable Serial Console
allIf possible, disable UART/serial console in firmware configuration
🧯 If You Can't Patch
- Deploy devices in physically secure locations with restricted access
- Implement tamper detection and monitoring for physical access attempts
🔍 How to Verify
Check if Vulnerable:
Physically inspect device for exposed UART/serial pins. Connect with serial adapter and check if root shell is accessible without authentication.
Check Version:
Check firmware version through Reolink mobile app or web interface. No specific command available.
Verify Fix Applied:
After applying any firmware updates, test serial console access to verify authentication is required.
📡 Detection & Monitoring
Log Indicators:
- Serial console access logs (if available)
- Unexpected reboots or configuration changes
Network Indicators:
- Unusual network traffic from device after physical access
SIEM Query:
Search for device configuration changes without corresponding authorized maintenance events