CVE-2025-56802
MEDIUMReolink desktop app - Info Disclosure
Title source: llmDescription
The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CVE-2025-56801. NOTE: the Supplier's position is that material is not hardcoded and is instead randomly generated on each installation of the application.
Exploits (1)
github
WORKING POC
2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-56802
Scores
CVSS v3
5.1
EPSS
0.0003
EPSS Percentile
7.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
Details
CWE
CWE-321
Status
published
Products (1)
reolink/reolink
8.18.12
Published
Oct 21, 2025
Tracked Since
Feb 18, 2026