CVE-2025-55627
BaseFortify
Publication date: 2025-08-22
Last updated on: 2025-08-22
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| reolink | smart_2k+_plug-in_wifi_video_doorbell | 3.0.0.4662_2503122283 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an insufficient privilege verification issue in the Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime firmware version 3.0.0.4662_2503122283. It allows authenticated attackers to create accounts with elevated privileges, meaning they can gain higher access rights than intended.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker who is already authenticated to escalate their privileges, potentially gaining unauthorized access to sensitive functions or data within the device, which could lead to security breaches or misuse of the device.