Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime - firmware v3.0.0.4662_2503122283 was discovered to contain a command injection vulnerability via the setddns_pip_system() function.
References
| Link | Resource |
|---|---|
| https://cwe.mitre.org/data/definitions/78.html | Technical Description |
| https://relieved-knuckle-264.notion.site/Reolink-camera-command-injection-Ddns-username-23f437003642800f83aef6b07f914212?pvs=74 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-08-22 17:15
Updated : 2025-10-21 13:55
NVD link : CVE-2025-55637
Mitre link : CVE-2025-55637
CVE.ORG link : CVE-2025-55637
JSON object : View
Products Affected
reolink
- smart_2k\+_plug-in_wi-fi_video_doorbell_with_chime
- smart_2k\+_plug-in_wi-fi_video_doorbell_with_chime_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
