Reolink P2P Cameras
Reolink cameras in the RLC-4XX, RLC-5XX, and RLN-X10 series contain vulnerabilities in their P2P protocol implementation (CWE-321 weak encryption, CWE-319 use of hard-coded credentials) that allow unauthorized remote access to video feeds and camera settings. An unauthenticated attacker can connect through Reolink's P2P cloud service to retrieve sensitive information from affected cameras. The P2P feature is enabled by default on these models. No vendor patch is available; the manufacturer recommends disabling P2P and using local network access only. Firmware updates may provide some risk mitigation.
- Network access to Reolink P2P cloud service (internet-facing)
- P2P feature enabled on the camera (default state)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e74dca01-9164-48d0-8617-14d3f85cc899Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.