Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity."
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 21 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
Description Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity."

Tue, 21 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Reolink
Reolink reolink
Reolink video Doorbell
Vendors & Products Reolink
Reolink reolink
Reolink video Doorbell

Mon, 20 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Oct 2025 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-306
CWE-922
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 20 Oct 2025 16:00:00 +0000

Type Values Removed Values Added
Description Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T12:52:58.456Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-60856

cve-icon Vulnrichment

Updated: 2025-10-20T16:12:13.384Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-20T16:15:39.380

Modified: 2025-10-21T19:31:25.450

Link: CVE-2025-60856

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-21T09:39:50Z