The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CVE-2025-56801. NOTE: the Suppliers position is that material is not hardcoded and is instead randomly generated on each installation of the application.
The product uses a hard-coded, unchangeable cryptographic key.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Reolink | Reolink | 8.18.12 (including) | 8.18.12 (including) |