CVE-2025-56802
BaseFortify
Publication date: 2025-10-21
Last updated on: 2025-11-17
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| reolink | reolink | 8.18.12 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the Reolink desktop application involves the use of a hard-coded and predictable AES encryption key to encrypt user configuration files. This flaw allows attackers who have local access to the system to decrypt sensitive application data stored in the %APPDATA% directory.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing an attacker with local access to your system to decrypt sensitive configuration data of the Reolink application. This could lead to unauthorized access to personal or application-related information stored within the encrypted files.