CVE-2025-63296
📋 TL;DR
This vulnerability allows arbitrary code execution as root on KERUI K259 5MP Wi-Fi/Tuya Smart Security Cameras. During startup, the camera automatically executes scripts from mounted TF/SD cards without authentication. Anyone using affected camera firmware versions is vulnerable to complete device compromise.
💻 Affected Systems
- KERUI K259 5MP Wi-Fi Smart Security Camera
- Tuya Smart Security Camera (KERUI K259 variant)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full device takeover with persistent root access, enabling surveillance interception, network pivoting, or botnet recruitment.
Likely Case
Local attacker with physical access to SD card slot gains root shell, potentially installing backdoors or modifying camera functionality.
If Mitigated
With proper physical security and no external storage access, risk is limited to authorized users with SD card access.
🎯 Exploit Status
Public exploit code available; requires physical SD card insertion or ability to mount malicious storage.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: Yes
Instructions:
1. Check vendor website for firmware updates
2. If update available, download from official source
3. Follow vendor flashing instructions
4. Verify /usr/sbin/anyka_service.sh no longer executes /mnt/update.nor.sh
🔧 Temporary Workarounds
Disable SD Card Auto-execution
linuxModify startup script to remove automatic execution of update.nor.sh
sed -i '/update\.nor\.sh/d' /usr/sbin/anyka_service.sh
Physical SD Card Slot Protection
allApply tamper-evident seal or lock to prevent unauthorized SD card insertion
🧯 If You Can't Patch
- Physically disable or block SD/TF card slot with epoxy or physical barrier
- Place cameras in secure locations with restricted physical access
🔍 How to Verify
Check if Vulnerable:
Check if /usr/sbin/anyka_service.sh contains references to update.nor.sh: grep -n 'update\.nor\.sh' /usr/sbin/anyka_service.sh
Check Version:
Check firmware version in web interface or run: cat /etc/version
Verify Fix Applied:
Verify grep command returns no results and test with benign update.nor.sh script on SD card
📡 Detection & Monitoring
Log Indicators:
- Execution of /tmp/net.sh
- Mounting of external storage during boot
- Unexpected root shell activity
Network Indicators:
- Unusual outbound connections from camera
- Unexpected network services running
SIEM Query:
process.name:"/tmp/net.sh" OR file.path:"/mnt/update.nor.sh"