AES Encryption Vulnerability in Reolink Desktop Application
CVE-2025-56802

5.1MEDIUM

Key Information:

Vendor

Reolink

Vendor
CVE Published:
21 October 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-56802?

The Reolink desktop application contains a vulnerability due to the use of a hard-coded and predictable AES encryption key for encrypting user configuration files. This flaw allows attackers with local access to the system to potentially decrypt sensitive application data stored in the %APPDATA% directory. Although the vendor asserts that the encryption key is generated randomly during installation, the risk remains significant as predictable encryption compromises the integrity and security of user data.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability Reserved

.