CVE-2025-56799

Reolink desktop application 8.18.12 contains a command injection vulnerability in its scheduled cache-clearing mechanism via a crafted folder name. NOTE: this is disputed by the Supplier because a crafted folder name would arise only if the local user were attacking himself.
References
Link Resource
https://github.com/shinyColumn/CVE-2025-56799 Exploit Third Party Advisory
https://shinycolumn.notion.site/reolink-command-injection Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:reolink:reolink:8.18.12:*:*:*:desktop:*:*:*

History

17 Nov 2025, 12:46

Type Values Removed Values Added
References () https://github.com/shinyColumn/CVE-2025-56799 - () https://github.com/shinyColumn/CVE-2025-56799 - Exploit, Third Party Advisory
References () https://shinycolumn.notion.site/reolink-command-injection - () https://shinycolumn.notion.site/reolink-command-injection - Exploit, Third Party Advisory
First Time Reolink
Reolink reolink
CPE cpe:2.3:a:reolink:reolink:8.18.12:*:*:*:desktop:*:*:*

Information

Published : 2025-10-21 19:21

Updated : 2025-11-17 12:46


NVD link : CVE-2025-56799

Mitre link : CVE-2025-56799

CVE.ORG link : CVE-2025-56799


JSON object : View

Products Affected

reolink

  • reolink
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')