CVE-2025-67316

5.4 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on devices running realme Internet browser v.45.13.4.1 by tricking users into visiting a malicious webpage. The attack exploits a cross-site scripting (XSS) weakness in the built-in HeyTap/ColorOS browser component. All users of this specific browser version on realme devices are affected.

💻 Affected Systems

Products:
  • realme Internet browser
Versions: v.45.13.4.1
Operating Systems: Android (realme devices with ColorOS/HeyTap)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the built-in browser on realme devices, not third-party browsers. Requires user interaction to visit malicious page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attacker to install malware, steal sensitive data, or gain persistent access to the device.

🟠

Likely Case

Session hijacking, credential theft, or installation of unwanted software through drive-by download attacks.

🟢

If Mitigated

Limited impact if browser sandboxing works properly, potentially just temporary script execution in browser context.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to visit attacker-controlled webpage. The GitHub gist suggests proof-of-concept exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://realme.com

Restart Required: No

Instructions:

1. Check for browser updates in Google Play Store or device settings. 2. If update available, install immediately. 3. If no update, follow workarounds.

🔧 Temporary Workarounds

Disable JavaScript

android

Prevents script execution that could exploit the vulnerability

Use Alternative Browser

android

Switch to a different browser like Chrome or Firefox until patch available

🧯 If You Can't Patch

  • Block access to untrusted websites using network filtering or parental controls
  • Educate users to avoid clicking unknown links and enable browser security warnings

🔍 How to Verify

Check if Vulnerable:

Open realme Internet browser > Settings > About browser > Check version is 45.13.4.1

Check Version:

Not applicable for mobile devices - check through browser settings

Verify Fix Applied:

Update browser and verify version is higher than 45.13.4.1

📡 Detection & Monitoring

Log Indicators:

  • Unusual browser crashes
  • Suspicious JavaScript execution patterns
  • Unexpected file downloads

Network Indicators:

  • Connections to known malicious domains from browser process
  • Unusual outbound traffic patterns

SIEM Query:

source="android_browser" AND (event="crash" OR event="suspicious_script")

🔗 References

📤 Share & Export