Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11908: Unrestricted Upload in Shenzhen Ruiming Technology Streamax Crocus

0
Medium
VulnerabilityCVE-2025-11908cvecve-2025-11908
Published: Fri Oct 17 2025 (10/17/2025, 18:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Ruiming Technology
Product: Streamax Crocus

Description

A security flaw has been discovered in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. The affected element is the function uploadFile of the file /FileDir.do?Action=Upload. Performing manipulation of the argument File results in unrestricted upload. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/17/2025, 19:02:41 UTC

Technical Analysis

CVE-2025-11908 is a vulnerability identified in Shenzhen Ruiming Technology's Streamax Crocus software version 1.3.40. The flaw exists in the uploadFile function accessible via the endpoint /FileDir.do?Action=Upload, where the argument 'File' is insufficiently validated, allowing an attacker to perform unrestricted file uploads. This means an attacker can remotely upload arbitrary files, including potentially malicious scripts or executables, without requiring authentication or user interaction. The vulnerability is exploitable over the network with low attack complexity and no privileges needed, as indicated by the CVSS 4.0 vector: AV:N/AC:L/PR:L/UI:N. The impact on confidentiality, integrity, and availability is low individually but collectively significant, as unauthorized file uploads can lead to remote code execution, data leakage, or service disruption. The vendor was contacted but has not responded or provided patches, and no official remediation is available. Although no active exploitation in the wild has been reported, a public exploit has been released, increasing the likelihood of attacks. The affected product is commonly used in video surveillance and fleet management solutions, which are critical in various industries. The lack of secure upload controls and vendor response heightens the risk profile of this vulnerability.

Potential Impact

For European organizations, the unrestricted upload vulnerability poses risks of unauthorized system access, data breaches, and potential disruption of surveillance or fleet management operations. Compromise of Streamax Crocus devices could lead to attackers deploying malware, establishing persistence, or exfiltrating sensitive video or operational data. This can affect privacy compliance under GDPR if personal data is exposed. Critical infrastructure relying on these systems may experience operational interruptions or safety risks. The medium severity reflects moderate direct impact but significant potential for escalation if combined with other vulnerabilities or misconfigurations. The public availability of exploits increases the threat landscape, particularly for organizations that have not implemented compensating controls or network segmentation. The absence of vendor patches means organizations must rely on defensive measures to mitigate risk.

Mitigation Recommendations

1. Immediately restrict network access to the affected upload endpoint (/FileDir.do?Action=Upload) using firewalls or web application firewalls (WAF) to allow only trusted IP addresses or internal networks. 2. Monitor logs for unusual file upload activity or unexpected file types and sizes. 3. Implement strict file type validation and scanning at the network perimeter if possible, blocking executable or script files. 4. Isolate Streamax Crocus devices on segmented networks to limit lateral movement in case of compromise. 5. Disable or restrict the upload functionality if feasible until a vendor patch is available. 6. Conduct regular vulnerability scans and penetration tests focusing on this endpoint. 7. Engage with Shenzhen Ruiming Technology for updates and consider alternative solutions if no remediation is forthcoming. 8. Educate security teams about this vulnerability and ensure incident response plans include scenarios involving unauthorized uploads. 9. Apply network intrusion detection systems (NIDS) signatures tuned to detect exploit attempts targeting this vulnerability. 10. Maintain backups of device configurations and data to enable recovery if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-17T13:01:39.537Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f28f159c34d0947f3bb416

Added to database: 10/17/2025, 6:46:45 PM

Last enriched: 10/17/2025, 7:02:41 PM

Last updated: 10/19/2025, 4:53:15 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats