Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11909: SQL Injection in Shenzhen Ruiming Technology Streamax Crocus

0
Medium
VulnerabilityCVE-2025-11909cvecve-2025-11909
Published: Fri Oct 17 2025 (10/17/2025, 18:32:07 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Ruiming Technology
Product: Streamax Crocus

Description

A weakness has been identified in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. The impacted element is the function queryLast of the file /RepairRecord.do?Action=QueryLast. Executing manipulation of the argument orderField can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/17/2025, 19:02:25 UTC

Technical Analysis

CVE-2025-11909 is a SQL injection vulnerability identified in Shenzhen Ruiming Technology's Streamax Crocus software, version 1.3.40. The vulnerability resides in the queryLast function accessed via the /RepairRecord.do?Action=QueryLast endpoint. Specifically, the orderField parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This injection can be performed remotely without user interaction and requires only limited privileges, making exploitation feasible over the network. The impact of successful exploitation includes unauthorized access to sensitive database information, potential modification or deletion of records, and disruption of application functionality. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vendor was notified early but has not issued any patches or advisories, and a public exploit is available, increasing the risk of exploitation. No known active exploitation has been reported yet. The lack of vendor response and patch availability means affected organizations must rely on compensating controls and proactive monitoring. The vulnerability affects a specific version (1.3.40) of Streamax Crocus, a product likely used in repair record management or related operational contexts.

Potential Impact

For European organizations utilizing Streamax Crocus 1.3.40, this vulnerability poses significant risks including unauthorized disclosure of sensitive repair records and operational data, data integrity compromise through unauthorized modification or deletion, and potential denial of service if database operations are disrupted. Given the remote exploitability without user interaction and low complexity, attackers could automate attacks to extract confidential information or manipulate data, impacting business continuity and compliance with data protection regulations such as GDPR. Sectors relying on this software for operational management, including manufacturing, logistics, and maintenance services, could experience operational disruptions. The absence of vendor patches increases exposure duration, and public exploit availability raises the likelihood of targeted attacks. Data breaches resulting from this vulnerability could lead to reputational damage and regulatory penalties within the European Union and other jurisdictions with strict data privacy laws.

Mitigation Recommendations

Immediate mitigation should focus on implementing strict input validation and sanitization for the orderField parameter at the application or web server level, employing web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the /RepairRecord.do?Action=QueryLast endpoint. Network segmentation and restricting external access to the affected application can reduce exposure. Organizations should monitor database logs and application logs for unusual query patterns indicative of injection attempts. Employing database-level protections such as least privilege for application database accounts can limit the impact of successful injections. Since no vendor patch is available, consider deploying virtual patching via WAF or reverse proxy solutions. Additionally, organizations should prepare incident response plans specific to SQL injection attacks and conduct regular security assessments of the affected systems. Where feasible, upgrade or replace the vulnerable software version once a patch or secure alternative is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-17T13:01:50.610Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f28f159c34d0947f3bb41d

Added to database: 10/17/2025, 6:46:45 PM

Last enriched: 10/17/2025, 7:02:25 PM

Last updated: 10/19/2025, 12:26:57 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats