Home

Description

The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CVE-2025-56801. NOTE: the Supplier's position is that material is not hardcoded and is instead randomly generated on each installation of the application.

PUBLISHED Reserved 2025-08-17 | Published 2025-10-21 | Updated 2025-10-22 | Assigner mitre

References

shinycolumn.notion.site/reolink-aes-key

github.com/shinyColumn/CVE-2025-56802

cve.org (CVE-2025-56802)

nvd.nist.gov (CVE-2025-56802)

Download JSON