CVE-2025-55630
BaseFortify
Publication date: 2025-08-22
Last updated on: 2025-10-21
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| reolink | smart_2k\+_plug-in_wi-fi_video_doorbell_with_chime_firmware | 3.0.0.4662_2503122283 |
| reolink | smart_2k\+_plug-in_wi-fi_video_doorbell_with_chime | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a discrepancy in the error message returned by the login function of the Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime (firmware v3.0.0.4662_2503122283). When a user enters a wrong username and password, the device returns different error messages that allow an attacker to determine which usernames exist on the system, effectively enabling account enumeration.
How can this vulnerability impact me? :
This vulnerability can allow attackers to enumerate existing user accounts by analyzing the different error messages returned during login attempts. This can facilitate targeted attacks such as password guessing or social engineering against valid accounts, potentially leading to unauthorized access.