Vulnerability title: Access manager settings page with IDOR (no modifications)
Date of discovery: 2025.07.05
Discovery Location (URL or System Path) :
Reolink Firmware Web Page → Session Storage
Vulnerability Type (CWE ID): CWE-639: Authorization Bypass Through User-Controlled Key
Vulnerability Description: A vulnerability was discovered in which a user with regular privileges can access the admin-only settings page by manipulating the account name stored in the session storage. This is due to the server failing to properly verify user permissions, instead relying solely on client-side session storage values. An attacker can edit the session storage and load the admin settings page without any privilege escalation.
Impacted Products/Services: Reolink Firmware Web Interface
Product version: firmware v3.0.0.4662_2503122283
Vulnerable Components:
The system trusts the account identifier stored in client-side session storage and permits access to privileged pages without server-side authorization checks.
Attack Vector
An attacker can use the browser's developer tools to modify the session storage value (specifically the account name) to admin
, thereby gaining access to the admin UI without possessing admin rights.
Reproduction Steps
word1
to word5
values, word4
stores the username (after decryption).word4
value to admin
, which is the default admin username for Reolink.Video Proof-of-Concept