Логотип exploitDog
bind:CVE-2025-60856
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-60856

Количество 2

Количество 2

nvd логотип

CVE-2025-60856

4 месяца назад

Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity."

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-4259-rfmh-fqxw

4 месяца назад

Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges.

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-60856

Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity."

CVSS3: 6.8
0%
Низкий
4 месяца назад
github логотип
GHSA-4259-rfmh-fqxw

Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges.

CVSS3: 6.8
0%
Низкий
4 месяца назад

Уязвимостей на страницу