Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity."
References
Configurations
No configuration.
History
No history.
Information
Published : 2025-10-20 16:15
Updated : 2025-10-21 19:31
NVD link : CVE-2025-60856
Mitre link : CVE-2025-60856
CVE.ORG link : CVE-2025-60856
JSON object : View
Products Affected
No product.
