Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67264: n/a

0
Unknown
VulnerabilityCVE-2025-67264cvecve-2025-67264
Published: Fri Jan 23 2026 (01/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An OS command injection vulnerability in the com.sprd.engineermode component in Doogee Note59, Note59 Pro, and Note59 Pro+ allows a local attacker to execute arbitrary code and escalate privileges via the EngineerMode ADB shell, due to incomplete patching of CVE-2025-31710

AI-Powered Analysis

AILast updated: 01/23/2026, 20:35:19 UTC

Technical Analysis

CVE-2025-67264 is an operating system command injection vulnerability located in the com.sprd.engineermode component of the Doogee Note59 smartphone series, including Note59, Note59 Pro, and Note59 Pro+. This vulnerability arises from incomplete remediation of a prior vulnerability, CVE-2025-31710, leaving the EngineerMode ADB shell interface susceptible to exploitation. EngineerMode is typically a privileged diagnostic and engineering interface used for device testing and configuration. The vulnerability allows a local attacker—someone with physical or local access to the device—to inject arbitrary OS commands through this interface, resulting in arbitrary code execution and privilege escalation. This means an attacker can potentially gain root-level control over the device, bypassing normal security restrictions. The vulnerability does not require network access or remote exploitation, but relies on local access, which could be achieved through physical possession or via malware already present on the device. No public exploits are currently known, but the incomplete patching indicates a risk of future exploitation. The absence of a CVSS score requires an assessment based on the nature of the vulnerability: it impacts confidentiality, integrity, and availability by enabling full device compromise; exploitation is relatively straightforward once local access is obtained; and the affected scope is limited to the specified Doogee Note59 series devices. The vulnerability is significant for environments where these devices are used for sensitive communications or data storage.

Potential Impact

For European organizations, the impact of CVE-2025-67264 can be substantial if Doogee Note59 series devices are used within corporate or governmental environments. Successful exploitation allows attackers to execute arbitrary commands with elevated privileges, potentially leading to data theft, unauthorized surveillance, or disruption of device functionality. This can compromise sensitive corporate information, intellectual property, or personal data protected under GDPR. Additionally, compromised devices could serve as footholds for lateral movement within networks or be used to bypass mobile device management controls. The local access requirement limits remote exploitation but does not eliminate risk, especially in scenarios involving lost or stolen devices, insider threats, or malware infections that provide local code execution. The vulnerability also undermines trust in device integrity, which is critical for sectors such as finance, healthcare, and public administration. Given the incomplete patching, organizations relying on these devices must consider the risk of future exploit development and potential targeted attacks.

Mitigation Recommendations

To mitigate CVE-2025-67264, organizations should first verify if their Doogee Note59 series devices have received complete patches addressing this vulnerability; if no official patches exist, consider restricting or disabling the EngineerMode ADB shell interface entirely. Physical security controls should be enhanced to prevent unauthorized local access to devices, including enforcing strong device lock mechanisms and remote wipe capabilities. Mobile device management (MDM) solutions should be configured to monitor and restrict access to engineering or diagnostic modes. Regular audits of device configurations and installed applications can help detect unauthorized modifications or suspicious activity. Educate users on the risks of physical device compromise and the importance of reporting lost or stolen devices immediately. For environments where these devices are critical, consider replacing them with alternatives that have a stronger security posture and timely patching. Finally, maintain up-to-date threat intelligence to monitor for any emerging exploits targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6973d8294623b1157c61e916

Added to database: 1/23/2026, 8:20:57 PM

Last enriched: 1/23/2026, 8:35:19 PM

Last updated: 1/23/2026, 10:53:59 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats