Логотип exploitDog
bind:CVE-2025-60856
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-60856

Количество 3

Количество 3

nvd логотип

CVE-2025-60856

4 месяца назад

Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity."

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-4259-rfmh-fqxw

4 месяца назад

Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges.

CVSS3: 6.8
EPSS: Низкий
fstec логотип

BDU:2026-01015

4 месяца назад

Уязвимость микропрограммного обеспечения IP-камер Reolink WiFi, связанная с незащищённым хранением конфиденциальной информации, позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-60856

Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges. NOTE: this is disputed by the Supplier because of "certain restrictions on users privately connecting serial port cables" and because "the root user has a password and it meets the requirements of password security complexity."

CVSS3: 6.8
0%
Низкий
4 месяца назад
github логотип
GHSA-4259-rfmh-fqxw

Reolink Video Doorbell WiFi DB_566128M5MP_W allows root shell access through an unsecured UART/serial console. An attacker with physical access can connect to the exposed interface and execute arbitrary commands with root privileges.

CVSS3: 6.8
0%
Низкий
4 месяца назад
fstec логотип
BDU:2026-01015

Уязвимость микропрограммного обеспечения IP-камер Reolink WiFi, связанная с незащищённым хранением конфиденциальной информации, позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.8
0%
Низкий
4 месяца назад

Уязвимостей на страницу