Loading
The Reolink desktop application uses a hard-coded and predictable AES encryption key to encrypt user configuration files allowing attackers with local access to decrypt sensitive application data stored in %APPDATA%. A different vulnerability than CVE-2025-56801. NOTE: the Supplier's position is that material is not hardcoded and is instead randomly generated on each installation of the application.
Use CWE-321, Reolink vendor hub and Reolink product page to widen CVE-2025-56802 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-55619, CVE-2025-56799 and CVE-2025-55622 for nearby disclosures in the same product family.