CVE-2025-63674

6.8 MEDIUM

📋 TL;DR

This vulnerability allows local physical attackers with access to the device's SD card slot to execute arbitrary code by overriding the bootloader. It affects Blurams Lumi Security Camera (A31C) users who have not applied security patches. Attackers need physical access to exploit this flaw.

💻 Affected Systems

Products:
  • Blurams Lumi Security Camera (A31C)
Versions: v23.1227.472.2926 and likely earlier versions
Operating Systems: Embedded Linux/RTOS on camera hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration. Requires SD card slot access and ability to write bootloader files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing persistent malware installation, camera control takeover, network pivoting, and data exfiltration.

🟠

Likely Case

Local attacker gains root access to modify camera functionality, disable security features, or install surveillance malware.

🟢

If Mitigated

Limited impact if physical access controls prevent unauthorized device handling and SD card slots are secured.

🌐 Internet-Facing: LOW - Requires physical access, not remotely exploitable over network.
🏢 Internal Only: MEDIUM - Physical access needed, but insider threats or unauthorized personnel could exploit if devices are accessible.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires physical access and basic knowledge of bootloader manipulation. Research details published at vindivlabs.com.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

Check Blurams website for firmware updates. If update available: 1. Download latest firmware 2. Follow vendor update procedure 3. Verify version after update.

🔧 Temporary Workarounds

Physical Access Control

all

Secure camera placement to prevent unauthorized physical access to SD card slot

SD Card Slot Protection

all

Use tamper-evident seals or enclosures to cover SD card slot

🧯 If You Can't Patch

  • Physically secure cameras in locked enclosures or restricted areas
  • Disable or physically block SD card slots if not needed for functionality
  • Implement camera network segmentation to limit lateral movement

🔍 How to Verify

Check if Vulnerable:

Check camera firmware version via Blurams app or web interface. If version is v23.1227.472.2926 or earlier, assume vulnerable.

Check Version:

Check via Blurams mobile app or camera web interface settings

Verify Fix Applied:

Verify firmware version is newer than v23.1227.472.2926. Test SD card boot behavior if possible.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Bootloader modification timestamps
  • SD card access logs

Network Indicators:

  • Unusual outbound connections from camera
  • Changed camera behavior patterns

SIEM Query:

Device:vendor="Blurams" AND (event:reboot OR file:bootloader*)

🔗 References

📤 Share & Export