Reolink desktop application 8.18.12 contains a command injection vulnerability in its scheduled cache-clearing mechanism via a crafted folder name. NOTE: this is disputed by the Supplier because a crafted folder name would arise only if the local user were attacking himself.
History

Thu, 23 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Reolink
Reolink reolink
Vendors & Products Reolink
Reolink reolink

Wed, 22 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
Description Reolink desktop application 8.18.12 contains a command injection vulnerability in its scheduled cache-clearing mechanism via a crafted folder name. Reolink desktop application 8.18.12 contains a command injection vulnerability in its scheduled cache-clearing mechanism via a crafted folder name. NOTE: this is disputed by the Supplier because a crafted folder name would arise only if the local user were attacking himself.

Tue, 21 Oct 2025 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Tue, 21 Oct 2025 19:00:00 +0000

Type Values Removed Values Added
Description Reolink desktop application 8.18.12 contains a command injection vulnerability in its scheduled cache-clearing mechanism via a crafted folder name.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-10-21T00:00:00.000Z

Updated: 2025-10-22T13:14:10.039Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-56799

cve-icon Vulnrichment

Updated: 2025-10-21T20:10:30.645Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-21T19:21:22.663

Modified: 2025-10-22T14:15:50.863

Link: CVE-2025-56799

cve-icon Redhat

No data.