📌 1. Reporting information


🧩 2. Overview of Vulnerabilities


🔍 3. Details

This vulnerability verification was performed securely using two test accounts (Account A, Account B) created and owned by the complainant without aggressive scanning.

1. [Understanding URL structure]: Log in to the Reolink mobile app with test account A. After that, analyze the share_reolink.xml file or log in the app's internal repository to see the URL information that fetches the profile picture.

Verified URL format: https://reolink-storage.s3.us-east-1.amazonaws.com/website/uploads/cloud/avatars/{USER_ID}.jpg

Here, {USER_ID} is a user-specific identifier in the same numeric format as 951827415007458.