CVE-2025-56801

The Reolink Desktop Application 8.18.12 contains hardcoded credentials as the Initialization Vector (IV) in its AES-CFB encryption implementation allowing attackers with access to the application environment to reliably decrypt encrypted configuration data. NOTE: the Supplier's position is that material is not hardcoded and is instead randomly generated on each installation of the application.
References
Link Resource
https://github.com/shinyColumn/CVE-2025-56801 Exploit Third Party Advisory
https://shinycolumn.notion.site/reolink-aes-iv Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:reolink:reolink:8.18.12:*:*:*:desktop:*:*:*

History

17 Nov 2025, 12:46

Type Values Removed Values Added
References () https://github.com/shinyColumn/CVE-2025-56801 - () https://github.com/shinyColumn/CVE-2025-56801 - Exploit, Third Party Advisory
References () https://shinycolumn.notion.site/reolink-aes-iv - () https://shinycolumn.notion.site/reolink-aes-iv - Exploit, Third Party Advisory
First Time Reolink
Reolink reolink
CPE cpe:2.3:a:reolink:reolink:8.18.12:*:*:*:desktop:*:*:*

Information

Published : 2025-10-21 19:21

Updated : 2025-11-17 12:46


NVD link : CVE-2025-56801

Mitre link : CVE-2025-56801

CVE.ORG link : CVE-2025-56801


JSON object : View

Products Affected

reolink

  • reolink
CWE
CWE-321

Use of Hard-coded Cryptographic Key