Reolink v4.54.0.4.20250526 was discovered to contain a hardcoded encryption key and initialization vector. An attacker can leverage this vulnerability to decrypt access tokens and web session tokens stored inside the app via reverse engineering.
Metrics
Affected Vendors & Products
References
History
Thu, 28 Aug 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:reolink:reolink:4.54.0.4.20250526:*:*:*:*:android:*:* |
Tue, 26 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-321 | |
References |
| |
Metrics |
cvssV3_1
|
Sat, 23 Aug 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android Reolink Reolink reolink |
|
Vendors & Products |
Google
Google android Reolink Reolink reolink |
Fri, 22 Aug 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Reolink v4.54.0.4.20250526 was discovered to contain a hardcoded encryption key and initialization vector. An attacker can leverage this vulnerability to decrypt access tokens and web session tokens stored inside the app via reverse engineering. | |
References |
|
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-08-26T14:07:44.597Z
Reserved: 2025-08-13T00:00:00.000Z
Link: CVE-2025-55619

Updated: 2025-08-26T13:11:13.227Z

Status : Analyzed
Published: 2025-08-22T17:15:32.727
Modified: 2025-08-28T13:34:45.180
Link: CVE-2025-55619

No data.

Updated: 2025-08-23T11:53:10Z