Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55629: n/a

0
Medium
VulnerabilityCVE-2025-55629cvecve-2025-55629
Published: Fri Aug 22 2025 (08/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Insecure permissions in Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3.0.0.4662_2503122283 allow attackers to arbitrarily change other users' passwords via manipulation of the userName value.

AI-Powered Analysis

AILast updated: 08/22/2025, 17:19:01 UTC

Technical Analysis

CVE-2025-55629 is a security vulnerability identified in the Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime, specifically affecting firmware version 3.0.0.4662_2503122283. The vulnerability arises due to insecure permissions that allow an attacker to manipulate the 'userName' parameter to arbitrarily change other users' passwords. This flaw indicates a lack of proper access control and input validation within the device's firmware, enabling unauthorized users to escalate privileges or take over accounts without authentication. The vulnerability does not require prior authentication or user interaction, making it particularly dangerous. Although no known exploits are currently reported in the wild, the potential for exploitation exists given the nature of the flaw. The absence of a CVSS score suggests that the vulnerability is newly disclosed and has not yet undergone formal severity assessment. The core technical issue is that the device's firmware improperly handles user credential management, allowing attackers to overwrite or reset passwords of other users by tampering with the username field, which could lead to full account takeover and unauthorized access to the device's video streams and controls.

Potential Impact

For European organizations, especially those using Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbells in office premises, residential buildings, or critical infrastructure sites, this vulnerability poses significant risks. Unauthorized password changes can lead to complete compromise of the device, allowing attackers to gain access to live video feeds, recorded footage, and potentially use the device as a foothold into the broader network. This could result in breaches of confidentiality, privacy violations, and unauthorized surveillance. Additionally, attackers could disrupt availability by locking out legitimate users or disabling the device. Organizations relying on these devices for physical security monitoring may face increased risk of undetected intrusions or sabotage. The vulnerability could also be exploited for lateral movement within networks if the device is connected to internal systems. Given the increasing adoption of IoT security devices in Europe, the impact extends beyond individual users to organizational security postures and compliance with data protection regulations such as GDPR.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately verify the firmware version of their Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbells and avoid using the affected firmware version 3.0.0.4662_2503122283. Since no official patch links are currently available, organizations should monitor Reolink's official channels for firmware updates addressing this issue. In the interim, restrict network access to the devices by placing them behind firewalls or VLANs that limit exposure to untrusted networks. Implement network segmentation to isolate IoT devices from critical IT infrastructure. Employ strong network-level authentication and monitoring to detect unusual access patterns. Disable remote management features if not required. Additionally, conduct regular audits of device user accounts and credentials to detect unauthorized changes. For organizations with large deployments, consider alternative devices with better security track records until a patch is released. Finally, raise user awareness about the risks of IoT device compromise and enforce strict physical security controls to prevent local tampering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a8a2b8ad5a09ad0020863f

Added to database: 8/22/2025, 5:02:48 PM

Last enriched: 8/22/2025, 5:19:01 PM

Last updated: 10/7/2025, 1:49:51 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats