An issue in the lock screen component of Reolink v4.54.0.4.20250526 allows attackers to bypass authentication via using an ADB (Android Debug Bridge).
                
            References
                    | Link | Resource | 
|---|---|
| https://relieved-knuckle-264.notion.site/Reolink-App-lock-screen-Bypass-21a437003642804f869fde8535d18a3f?source=copy_link | Exploit Third Party Advisory | 
Configurations
                    History
                    28 Aug 2025, 13:24
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| CPE | cpe:2.3:a:reolink:reolink:4.54.0.4.20250526:*:*:*:*:android:*:* | |
| References | () https://relieved-knuckle-264.notion.site/Reolink-App-lock-screen-Bypass-21a437003642804f869fde8535d18a3f?source=copy_link - Exploit, Third Party Advisory | |
| First Time | Reolink reolink Reolink | 
22 Aug 2025, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.4 | 
| CWE | CWE-288 | 
22 Aug 2025, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-08-22 17:15
Updated : 2025-08-28 13:24
NVD link : CVE-2025-55623
Mitre link : CVE-2025-55623
CVE.ORG link : CVE-2025-55623
JSON object : View
Products Affected
                reolink
- reolink
CWE
                
                    
                        
                        CWE-288
                        
            Authentication Bypass Using an Alternate Path or Channel
