Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 20 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 20 Oct 2025 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-306
CWE-922
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 20 Oct 2025 16:00:00 +0000

Type Values Removed Values Added
Description Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-20T16:12:55.660Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-60856

cve-icon Vulnrichment

Updated: 2025-10-20T16:12:13.384Z

cve-icon NVD

Status : Received

Published: 2025-10-20T16:15:39.380

Modified: 2025-10-20T17:15:38.210

Link: CVE-2025-60856

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.