CVE-2025-67316
BaseFortify
Publication date: 2026-01-05
Last updated on: 2026-03-26
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| realme | internet_browser | 45.13.4.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid using the vulnerable version 45.13.4.1 of the realme Internet browser (HeyTap/ColorOS browser). Do not visit untrusted or suspicious webpages that could deliver the crafted content exploiting this flaw. Monitor for updates or patches from the vendor to upgrade to a fixed version once available. [1]
Can you explain this vulnerability to me?
This vulnerability is an Incorrect Access Control issue in the built-in HeyTap/ColorOS Internet browser version 45.13.4.1 used by realme devices. It allows a remote attacker to execute arbitrary code by delivering a specially crafted webpage to the vulnerable browser, potentially compromising the affected device. [1]
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a remote attacker to execute arbitrary code on your device through the realme Internet browser. This could lead to unauthorized control or compromise of your device, potentially exposing your data or affecting device functionality. [1]