Vulnerability Description
KERUI K259 5MP Wi-Fi / Tuya Smart Security Camera firmware v33.53.87 contains a code execution vulnerability in its boot/update logic: during startup /usr/sbin/anyka_service.sh scans mounted TF/SD cards and, if /mnt/update.nor.sh is present, copies it to /tmp/net.sh and executes it as root.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Keruistore | Kerui K259 Firmware | 33.53.87 |
| Keruistore | Kerui K259 | - |
Related Weaknesses (CWE)
References
- https://gist.github.com/t4e-3/082cdd0b7ee6b650c7aaae97fd4e016cExploitThird Party Advisory
- https://github.com/t4e-3/CVE-2025-63296ExploitThird Party Advisory
FAQ
What is CVE-2025-63296?
CVE-2025-63296 is a vulnerability with a CVSS score of 6.5 (MEDIUM). KERUI K259 5MP Wi-Fi / Tuya Smart Security Camera firmware v33.53.87 contains a code execution vulnerability in its boot/update logic: during startup /usr/sbin/anyka_service.sh scans mounted TF/SD car...
How severe is CVE-2025-63296?
CVE-2025-63296 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-63296?
Check the references section above for vendor advisories and patch information. Affected products include: Keruistore Kerui K259 Firmware, Keruistore Kerui K259.