Post 45 | Security Advisory: Improper Firmware Signature Verification in Reolink Video Doorbell Wi-Fi (CVE-2025-60855)
Author: Shaunak Ganorkar, Traboda Cyberlabs Pvt. Ltd.
Published: October 2025
CVE ID: CVE-2025-60855
Vendor: Reolink
Product: Reolink Video Doorbell Wi-Fi – DB_566128M5MP_W
Affected Components: /app/upgrade
, libmbedtls.so
, libmbedcrypto.so
Impact: Remote Arbitrary Code Execution with Root Privileges
Severity: High
Status: Public
Summary
The Reolink Video Doorbell Wi-Fi (DB_566128M5MP_W) firmware performs insufficient validation of firmware update signatures.
Attackers can upload maliciously modified firmware images that bypass cryptographic verification, allowing remote code execution with root privileges.
Vulnerability Details
- Vulnerability Type: Improper Verification of Cryptographic Signature (CWE-347)
- Attack Type: Remote (via malicious firmware upload)
- Impact: Full compromise of device integrity and control
- Attack Vector: An attacker with network or local access can deliver a crafted firmware update that bypasses validation logic due to missing signature checks in
libmbedtls.so
andlibmbedcrypto.so
.
Technical Findings
- Firmware extraction revealed
/app/upgrade
invokes cryptographic routines without validating signatures against a trusted keychain. - The function performing the signature check does not verify the certificate chain or digest comparison, allowing unsigned firmware acceptance.
- Modified firmware binaries were successfully repacked with arbitrary payloads without rejection.
Impact
- Execution of attacker-supplied code as root
- Permanent firmware compromise
- Possibility of malware persistence and network pivoting
- Undermined update trust chain
Recommendations
For Users
- Apply only official firmware updates downloaded directly from Reolink Download Center.
- Disconnect the doorbell from external networks until a fixed firmware is provided.
For Vendor
- Implement strong cryptographic signature validation with trusted root CA verification.
- Enforce secure boot and reject unsigned images.
- Audit all firmware update mechanisms for tampering prevention.
Discoverer
Shaunak Ganorkar
Traboda Cyberlabs Pvt. Ltd.
🔗 https://www.cybermaya.in
🔗 https://traboda.com
🔗 https://www.linkedin.com/in/shaunakganorkar
Disclaimer
This research was conducted using responsible disclosure principles.
No live systems were harmed during analysis. Users and vendors are encouraged to patch or retire affected devices immediately.