The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CVE-2025-56801. NOTE: the Suppliers position is that material is not hardcoded and is instead randomly generated on each installation of the application.
The product uses a hard-coded, unchangeable cryptographic key.