Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-56800

EPSS 0.07% · P22
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-56800

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Reolink desktop application 8.18.12 contains a vulnerability in its local authentication mechanism. The application implements lock screen password logic entirely on the client side using JavaScript within an Electron resource file. Because the password is stored and returned via a modifiable JavaScript property(a.settingsManager.lockScreenPassword), an attacker can patch the return value to bypass authentication. NOTE: this is disputed by the Supplier because the lock-screen bypass would only occur if the local user modified his own instance of the application.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Reolink desktop application 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Reolink desktop application是美国Reolink公司的一个安全摄像头监控软件。 Reolink desktop application 8.18.12版本存在安全漏洞,该漏洞源于本地身份验证机制实现不当,攻击者可通过修改JavaScript属性a.settingsManager.lockScreenPassword绕过身份验证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-56800

#POC DescriptionSource LinkShenlong Link
1Local Authentication Bypass Vulnerability in Reolink Desktop Applicationhttps://github.com/shinyColumn/CVE-2025-56800POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-56800

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-10-21 · 27 CVEs total

CVE-2025-605078.9 HIGHMoodle GeniAI plugin 安全漏洞
CVE-2020-368555.3 MEDIUMDCMTK dcmqrscp parseQuota stack-based overflow
CVE-2022-49813.3 LOWDCMTK dcmqrscp dcmqrcnf.cc readPeerList null pointer dereference
CVE-2025-52079D-Link DIR-820L 安全漏洞
CVE-2025-61457sharp 安全漏洞
CVE-2025-56802Reolink desktop application 安全漏洞
CVE-2025-56799Reolink desktop application 安全漏洞
CVE-2025-56801Reolink desktop application 安全漏洞
CVE-2025-61255PHPGurukul Bank Locker Management System 安全漏洞
CVE-2025-60427Libretime 安全漏洞
CVE-2025-60790ProcessWire 安全漏洞
CVE-2025-60772NETLINK HG322G 安全漏洞
CVE-2025-60506Moodle PDF Annotator plugin 安全漏洞
CVE-2025-60511Moodle OpenAI Chat Block plugin 安全漏洞
CVE-2025-60500QDocs Smart School Management System 安全漏洞
CVE-2025-60280Bang Resto 安全漏洞
CVE-2025-61220MySecondLine 安全漏洞
CVE-2025-61181DaiCuo CMS 安全漏洞
CVE-2025-61194DaiCuo CMS 安全漏洞
CVE-2025-56450Spacecom Log2Space Subscriber Management Software 安全漏洞

Showing top 20 of 27 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-56800

No comments yet


Leave a comment