Wyze Video Doorbell Pro

From Wiki-IoT


Classification

Wyze Video Doorbell Pro
Classification
Grade A
Calculator version 1
Classification date 2025-10-09
Information
Name Wyze Video Doorbell Pro
Brand by Parent Wyze by Wyze
Generation Pro version
Model(s) Video Doorbell Pro
Release date 2022-11-17
Type/Category Smart video doorbell (wired or battery)
Website [1]
Status In sale
More
Dimensions Doorbell: 141 mm × 46.5 mm × 28 mm
Mass 210 g
Operating system Embedded firmware
Companion App Wyze app (for mobile / remote control)
CPU not publicly documented
GPU not publicly documented
Memory not publicly documented
Storage no local storage; cloud-only
Battery Internal, non-removable lithium-ion battery (supports 3–6 months use)
Power Supports hardwired (existing doorbell wiring) or battery power
Charging USB recharge when battery is used
Display Device is a doorbell camera, no display screen
Camera 1440 × 1440 resolution, ultra-wide FOV 150° × 150°
Sound Two-way audio (microphone + speaker)
Connectivity Dual-band WiFi (2.4 GHz / 5 GHz); no local hub needed
Device
Criterion Value Proof(s) Comment
Known hardware tampering None [] No credible public reports of physical tampering of this model
Known vulnerabilities None [2] The device may have vulnerabilities like many IoT devices, but manufacturer actively issues patches
Prior attacks None [3] There have been reports in past of user footage cross-access among Wyze devices, prompting improved protections
Updatability Very common [4] The device supports firmware updates via Wyze app, which is common and encouraged
Category score 1
System
Criterion Value Proof(s) Comment
Authentication with other systems Full [5] It integrates with external systems like Alexa and Google
Communications Encrypted with up-to-date encryption [6] Communication between device and cloud / app is protected
Storage No encryption [7] It uses cloud storage only, no local storage to encrypt
Category score 2
User Authentication
Criterion Value Proof(s) Comment
Account management Full [8] Users can edit account data, manage devices, change security settings
Authentication Secure [9] Account login is protected by credentials + 2FA, enhancing security
Brute-force protection Exist [] Although not explicitly documented, 2FA and other protections imply defense against brute-force attacks
Event logging Access event logged [10] The system notifies and logs certain security-related events
Passwords Require change after setup with complexity requirements [11] Default or weak passwords are discouraged; users are urged to use robust passwords
Category score 1
Grade A