Reolink v4.54.0.4.20250526 was discovered to contain a hardcoded encryption key and initialization vector. An attacker can leverage this vulnerability to decrypt access tokens and web session tokens stored inside the app via reverse engineering.
                
            References
                    Configurations
                    History
                    28 Aug 2025, 13:34
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Reolink reolink Reolink | |
| CPE | cpe:2.3:a:reolink:reolink:4.54.0.4.20250526:*:*:*:*:android:*:* | |
| References | () https://cwe.mitre.org/data/definitions/321.html - Product | |
| References | () https://cwe.mitre.org/data/definitions/329.html - Product | |
| References | () https://developer.android.com/reference/kotlin/androidx/security/crypto/EncryptedSharedPreferences - Third Party Advisory | |
| References | () https://nvd.nist.gov/vuln/detail/CVE-2020-25173 - Not Applicable | |
| References | () https://www.notion.so/Reolink-Android-App-Uses-Hardcoded-AES-Key-and-IV-for-Sensitive-Data-Decryption-21a43700364280dc95bedcf6ac1a5db0 - Exploit, Third Party Advisory | |
| References | () https://relieved-knuckle-264.notion.site/Reolink-Android-App-Uses-Hardcoded-AES-Key-and-IV-for-Sensitive-Data-Decryption-21a43700364280dc95bedcf6ac1a5db0 - Exploit, Third Party Advisory | 
26 Aug 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| CWE | CWE-321 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| References | 
 | 
22 Aug 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-08-22 17:15
Updated : 2025-08-28 13:34
NVD link : CVE-2025-55619
Mitre link : CVE-2025-55619
CVE.ORG link : CVE-2025-55619
JSON object : View
Products Affected
                reolink
- reolink
CWE
                
                    
                        
                        CWE-321
                        
            Use of Hard-coded Cryptographic Key
