Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55621: n/a

0
Medium
VulnerabilityCVE-2025-55621cvecve-2025-55621
Published: Fri Aug 22 2025 (08/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An Insecure Direct Object Reference (IDOR) vulnerability in Reolink v4.54.0.4.20250526 allows unauthorized attackers to access and download other users' profile photos via a crafted URL. NOTE: this is disputed by the Supplier because it is intentional behavior; the photos are part of a social platform on which users expect to find one another.

AI-Powered Analysis

AILast updated: 09/09/2025, 21:42:45 UTC

Technical Analysis

CVE-2025-55621 identifies an Insecure Direct Object Reference (IDOR) vulnerability in the Reolink software version 4.54.0.4.20250526. This vulnerability allows unauthorized attackers to access and download other users' profile photos by crafting specific URLs that directly reference these objects without proper access control validation. IDOR vulnerabilities occur when an application exposes references to internal implementation objects such as files, database records, or URLs, and fails to verify the requesting user's authorization to access those objects. In this case, the Reolink platform, which includes a social feature where users can find and connect with one another, exposes profile photos in a manner that can be accessed without authentication or permission checks. The supplier disputes this classification as a vulnerability, arguing that the photos are intentionally made publicly accessible as part of the social platform's design. However, from a security perspective, this behavior can lead to unauthorized data disclosure if users expect privacy or limited access to their profile photos. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L, I:L) with no impact on availability (A:N). No known exploits are reported in the wild, and no patches have been linked yet. The vulnerability is categorized under CWE-639 (Authorization Bypass Through User-Controlled Key).

Potential Impact

For European organizations using Reolink devices or software, this vulnerability could lead to unauthorized disclosure of user profile photos, potentially violating privacy expectations and data protection regulations such as the GDPR. While the impact on confidentiality and integrity is rated low to medium, the exposure of personal images can have reputational consequences and may be exploited for social engineering or targeted phishing attacks. Organizations that deploy Reolink products in environments where user privacy is critical—such as corporate campuses, residential complexes, or public safety monitoring—may face compliance risks and user trust issues. The lack of authentication or access control in accessing profile photos means that any attacker with network access to the platform could harvest images without detection. However, since this vulnerability does not affect device functionality or availability, operational disruption is unlikely. The supplier's stance that this is intended behavior complicates mitigation and risk communication, requiring organizations to carefully assess their privacy policies and user agreements regarding data visibility on the platform.

Mitigation Recommendations

1. Organizations should review and update privacy settings and user agreements on the Reolink platform to clearly communicate the visibility of profile photos and obtain informed consent from users. 2. Network segmentation and access controls should be implemented to restrict access to the Reolink social platform to authorized users only, limiting exposure to potential attackers. 3. Monitor network traffic for unusual access patterns or bulk downloads of profile photos that could indicate exploitation attempts. 4. Engage with the supplier to clarify the intended behavior and request options for stricter access controls or opt-out mechanisms for profile photo visibility. 5. Where possible, disable or limit the social platform features that expose user profile photos if they are not essential to organizational use cases. 6. Incorporate this vulnerability into privacy impact assessments and compliance audits to ensure alignment with GDPR and other relevant data protection laws. 7. Educate users about the potential visibility of their profile photos and encourage cautious sharing of sensitive information on the platform.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a8a2b8ad5a09ad00208629

Added to database: 8/22/2025, 5:02:48 PM

Last enriched: 9/9/2025, 9:42:45 PM

Last updated: 10/7/2025, 1:49:53 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats