Wyze Video Doorbell Pro
From Wiki-IoT
Classification
| Wyze Video Doorbell Pro | |
|---|---|
| Classification | |
| Grade | A |
| Calculator version | 1 |
| Classification date | 2025-10-09 |
| Information | |
| Name | Wyze Video Doorbell Pro |
| Brand by Parent | Wyze by Wyze |
| Generation | Pro version |
| Model(s) | Video Doorbell Pro |
| Release date | 2022-11-17 |
| Type/Category | Smart video doorbell (wired or battery) |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | Doorbell: 141 mm × 46.5 mm × 28 mm |
| Mass | 210 g |
| Operating system | Embedded firmware |
| Companion App | Wyze app (for mobile / remote control) |
| CPU | not publicly documented |
| GPU | not publicly documented |
| Memory | not publicly documented |
| Storage | no local storage; cloud-only |
| Battery | Internal, non-removable lithium-ion battery (supports 3–6 months use) |
| Power | Supports hardwired (existing doorbell wiring) or battery power |
| Charging | USB recharge when battery is used |
| Display | Device is a doorbell camera, no display screen |
| Camera | 1440 × 1440 resolution, ultra-wide FOV 150° × 150° |
| Sound | Two-way audio (microphone + speaker) |
| Connectivity | Dual-band WiFi (2.4 GHz / 5 GHz); no local hub needed |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [] | No credible public reports of physical tampering of this model |
| Known vulnerabilities | None | [2] | The device may have vulnerabilities like many IoT devices, but manufacturer actively issues patches |
| Prior attacks | None | [3] | There have been reports in past of user footage cross-access among Wyze devices, prompting improved protections |
| Updatability | Very common | [4] | The device supports firmware updates via Wyze app, which is common and encouraged |
| Category score | 1 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [5] | It integrates with external systems like Alexa and Google |
| Communications | Encrypted with up-to-date encryption | [6] | Communication between device and cloud / app is protected |
| Storage | No encryption | [7] | It uses cloud storage only, no local storage to encrypt |
| Category score | 2 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [8] | Users can edit account data, manage devices, change security settings |
| Authentication | Secure | [9] | Account login is protected by credentials + 2FA, enhancing security |
| Brute-force protection | Exist | [] | Although not explicitly documented, 2FA and other protections imply defense against brute-force attacks |
| Event logging | Access event logged | [10] | The system notifies and logs certain security-related events |
| Passwords | Require change after setup with complexity requirements | [11] | Default or weak passwords are discouraged; users are urged to use robust passwords |
| Category score | 1 | ||
| Grade | A |
|---|