CVE-2025-11908: Unrestricted Upload in Shenzhen Ruiming Technology Streamax Crocus
A security flaw has been discovered in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. The affected element is the function uploadFile of the file /FileDir.do?Action=Upload. Performing manipulation of the argument File results in unrestricted upload. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11908 is a vulnerability identified in Shenzhen Ruiming Technology's Streamax Crocus software version 1.3.40. The flaw exists in the uploadFile function accessible via the endpoint /FileDir.do?Action=Upload, where the argument 'File' is insufficiently validated, allowing an attacker to perform unrestricted file uploads. This means an attacker can remotely upload arbitrary files, including potentially malicious scripts or executables, without requiring authentication or user interaction. The vulnerability is exploitable over the network with low attack complexity and no privileges needed, as indicated by the CVSS 4.0 vector: AV:N/AC:L/PR:L/UI:N. The impact on confidentiality, integrity, and availability is low individually but collectively significant, as unauthorized file uploads can lead to remote code execution, data leakage, or service disruption. The vendor was contacted but has not responded or provided patches, and no official remediation is available. Although no active exploitation in the wild has been reported, a public exploit has been released, increasing the likelihood of attacks. The affected product is commonly used in video surveillance and fleet management solutions, which are critical in various industries. The lack of secure upload controls and vendor response heightens the risk profile of this vulnerability.
Potential Impact
For European organizations, the unrestricted upload vulnerability poses risks of unauthorized system access, data breaches, and potential disruption of surveillance or fleet management operations. Compromise of Streamax Crocus devices could lead to attackers deploying malware, establishing persistence, or exfiltrating sensitive video or operational data. This can affect privacy compliance under GDPR if personal data is exposed. Critical infrastructure relying on these systems may experience operational interruptions or safety risks. The medium severity reflects moderate direct impact but significant potential for escalation if combined with other vulnerabilities or misconfigurations. The public availability of exploits increases the threat landscape, particularly for organizations that have not implemented compensating controls or network segmentation. The absence of vendor patches means organizations must rely on defensive measures to mitigate risk.
Mitigation Recommendations
1. Immediately restrict network access to the affected upload endpoint (/FileDir.do?Action=Upload) using firewalls or web application firewalls (WAF) to allow only trusted IP addresses or internal networks. 2. Monitor logs for unusual file upload activity or unexpected file types and sizes. 3. Implement strict file type validation and scanning at the network perimeter if possible, blocking executable or script files. 4. Isolate Streamax Crocus devices on segmented networks to limit lateral movement in case of compromise. 5. Disable or restrict the upload functionality if feasible until a vendor patch is available. 6. Conduct regular vulnerability scans and penetration tests focusing on this endpoint. 7. Engage with Shenzhen Ruiming Technology for updates and consider alternative solutions if no remediation is forthcoming. 8. Educate security teams about this vulnerability and ensure incident response plans include scenarios involving unauthorized uploads. 9. Apply network intrusion detection systems (NIDS) signatures tuned to detect exploit attempts targeting this vulnerability. 10. Maintain backups of device configurations and data to enable recovery if compromise occurs.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands
CVE-2025-11908: Unrestricted Upload in Shenzhen Ruiming Technology Streamax Crocus
Description
A security flaw has been discovered in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. The affected element is the function uploadFile of the file /FileDir.do?Action=Upload. Performing manipulation of the argument File results in unrestricted upload. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11908 is a vulnerability identified in Shenzhen Ruiming Technology's Streamax Crocus software version 1.3.40. The flaw exists in the uploadFile function accessible via the endpoint /FileDir.do?Action=Upload, where the argument 'File' is insufficiently validated, allowing an attacker to perform unrestricted file uploads. This means an attacker can remotely upload arbitrary files, including potentially malicious scripts or executables, without requiring authentication or user interaction. The vulnerability is exploitable over the network with low attack complexity and no privileges needed, as indicated by the CVSS 4.0 vector: AV:N/AC:L/PR:L/UI:N. The impact on confidentiality, integrity, and availability is low individually but collectively significant, as unauthorized file uploads can lead to remote code execution, data leakage, or service disruption. The vendor was contacted but has not responded or provided patches, and no official remediation is available. Although no active exploitation in the wild has been reported, a public exploit has been released, increasing the likelihood of attacks. The affected product is commonly used in video surveillance and fleet management solutions, which are critical in various industries. The lack of secure upload controls and vendor response heightens the risk profile of this vulnerability.
Potential Impact
For European organizations, the unrestricted upload vulnerability poses risks of unauthorized system access, data breaches, and potential disruption of surveillance or fleet management operations. Compromise of Streamax Crocus devices could lead to attackers deploying malware, establishing persistence, or exfiltrating sensitive video or operational data. This can affect privacy compliance under GDPR if personal data is exposed. Critical infrastructure relying on these systems may experience operational interruptions or safety risks. The medium severity reflects moderate direct impact but significant potential for escalation if combined with other vulnerabilities or misconfigurations. The public availability of exploits increases the threat landscape, particularly for organizations that have not implemented compensating controls or network segmentation. The absence of vendor patches means organizations must rely on defensive measures to mitigate risk.
Mitigation Recommendations
1. Immediately restrict network access to the affected upload endpoint (/FileDir.do?Action=Upload) using firewalls or web application firewalls (WAF) to allow only trusted IP addresses or internal networks. 2. Monitor logs for unusual file upload activity or unexpected file types and sizes. 3. Implement strict file type validation and scanning at the network perimeter if possible, blocking executable or script files. 4. Isolate Streamax Crocus devices on segmented networks to limit lateral movement in case of compromise. 5. Disable or restrict the upload functionality if feasible until a vendor patch is available. 6. Conduct regular vulnerability scans and penetration tests focusing on this endpoint. 7. Engage with Shenzhen Ruiming Technology for updates and consider alternative solutions if no remediation is forthcoming. 8. Educate security teams about this vulnerability and ensure incident response plans include scenarios involving unauthorized uploads. 9. Apply network intrusion detection systems (NIDS) signatures tuned to detect exploit attempts targeting this vulnerability. 10. Maintain backups of device configurations and data to enable recovery if compromise occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-17T13:01:39.537Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f28f159c34d0947f3bb416
Added to database: 10/17/2025, 6:46:45 PM
Last enriched: 10/17/2025, 7:02:41 PM
Last updated: 10/19/2025, 4:53:15 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
AI Chat Data Is History's Most Thorough Record of Enterprise Secrets. Secure It Wisely
MediumAI Agent Security: Whose Responsibility Is It?
MediumMicrosoft Disrupts Ransomware Campaign Abusing Azure Certificates
MediumMicrosoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign
MediumIdentity Security: Your First and Last Line of Defense
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.