CVE-2025-11910: SQL Injection in Shenzhen Ruiming Technology Streamax Crocus
A security vulnerability has been detected in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. This affects the function Query of the file /MemoryState.do?Action=Query. The manipulation of the argument orderField leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-11910 is a SQL injection vulnerability identified in version 1.3.40 of Shenzhen Ruiming Technology's Streamax Crocus software. The vulnerability resides in the Query function accessed via the /MemoryState.do?Action=Query endpoint, specifically through the orderField parameter. This parameter is not properly sanitized or validated, allowing an attacker to inject arbitrary SQL code remotely without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact vector includes low confidentiality, integrity, and availability impacts, suggesting partial but not full compromise potential. The vendor was notified early but has not responded or released patches, and no known exploits are currently observed in the wild. The vulnerability could be exploited to extract sensitive data, modify database contents, or disrupt service availability by manipulating backend database queries. This type of injection flaw is critical in web applications interfacing with databases, especially in surveillance or monitoring systems like Streamax Crocus, which may handle sensitive video or metadata. The lack of vendor response increases the risk profile, requiring organizations to implement immediate mitigations and monitoring.
Potential Impact
For European organizations, the SQL injection vulnerability in Streamax Crocus poses risks to data confidentiality, integrity, and availability. Exploitation could lead to unauthorized data disclosure, including sensitive surveillance data or operational metadata, potentially violating GDPR and other data protection regulations. Integrity of stored data could be compromised, affecting the reliability of surveillance records or system logs. Availability impacts could disrupt surveillance operations, critical in sectors such as transportation, public safety, or utilities. Given the remote exploitability without authentication, attackers could leverage this vulnerability to gain footholds in networks, escalate privileges, or move laterally. The absence of vendor patches and public exploit code increases urgency for defensive measures. Organizations relying on Streamax Crocus for security monitoring or operational control should assess exposure and implement compensating controls to prevent data breaches or operational disruptions.
Mitigation Recommendations
1. Immediately restrict network access to the /MemoryState.do?Action=Query endpoint using firewall rules or network segmentation to limit exposure to trusted hosts only. 2. Deploy and configure Web Application Firewalls (WAFs) with SQL injection detection and prevention capabilities to block malicious payloads targeting the orderField parameter. 3. Conduct thorough input validation and sanitization on all user-supplied parameters, especially orderField, if custom modifications or patches are possible. 4. Monitor application logs and network traffic for unusual query patterns or error messages indicative of SQL injection attempts. 5. If possible, isolate the Streamax Crocus system from critical networks until a vendor patch or official fix is available. 6. Engage with Shenzhen Ruiming Technology for updates and request a security patch or mitigation guidance. 7. Review and enhance database user privileges to follow the principle of least privilege, limiting the damage potential of injected queries. 8. Prepare incident response plans specific to database compromise scenarios involving Streamax Crocus. 9. Consider alternative or additional surveillance solutions if patching is delayed or vendor support remains absent.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-11910: SQL Injection in Shenzhen Ruiming Technology Streamax Crocus
Description
A security vulnerability has been detected in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. This affects the function Query of the file /MemoryState.do?Action=Query. The manipulation of the argument orderField leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-11910 is a SQL injection vulnerability identified in version 1.3.40 of Shenzhen Ruiming Technology's Streamax Crocus software. The vulnerability resides in the Query function accessed via the /MemoryState.do?Action=Query endpoint, specifically through the orderField parameter. This parameter is not properly sanitized or validated, allowing an attacker to inject arbitrary SQL code remotely without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact vector includes low confidentiality, integrity, and availability impacts, suggesting partial but not full compromise potential. The vendor was notified early but has not responded or released patches, and no known exploits are currently observed in the wild. The vulnerability could be exploited to extract sensitive data, modify database contents, or disrupt service availability by manipulating backend database queries. This type of injection flaw is critical in web applications interfacing with databases, especially in surveillance or monitoring systems like Streamax Crocus, which may handle sensitive video or metadata. The lack of vendor response increases the risk profile, requiring organizations to implement immediate mitigations and monitoring.
Potential Impact
For European organizations, the SQL injection vulnerability in Streamax Crocus poses risks to data confidentiality, integrity, and availability. Exploitation could lead to unauthorized data disclosure, including sensitive surveillance data or operational metadata, potentially violating GDPR and other data protection regulations. Integrity of stored data could be compromised, affecting the reliability of surveillance records or system logs. Availability impacts could disrupt surveillance operations, critical in sectors such as transportation, public safety, or utilities. Given the remote exploitability without authentication, attackers could leverage this vulnerability to gain footholds in networks, escalate privileges, or move laterally. The absence of vendor patches and public exploit code increases urgency for defensive measures. Organizations relying on Streamax Crocus for security monitoring or operational control should assess exposure and implement compensating controls to prevent data breaches or operational disruptions.
Mitigation Recommendations
1. Immediately restrict network access to the /MemoryState.do?Action=Query endpoint using firewall rules or network segmentation to limit exposure to trusted hosts only. 2. Deploy and configure Web Application Firewalls (WAFs) with SQL injection detection and prevention capabilities to block malicious payloads targeting the orderField parameter. 3. Conduct thorough input validation and sanitization on all user-supplied parameters, especially orderField, if custom modifications or patches are possible. 4. Monitor application logs and network traffic for unusual query patterns or error messages indicative of SQL injection attempts. 5. If possible, isolate the Streamax Crocus system from critical networks until a vendor patch or official fix is available. 6. Engage with Shenzhen Ruiming Technology for updates and request a security patch or mitigation guidance. 7. Review and enhance database user privileges to follow the principle of least privilege, limiting the damage potential of injected queries. 8. Prepare incident response plans specific to database compromise scenarios involving Streamax Crocus. 9. Consider alternative or additional surveillance solutions if patching is delayed or vendor support remains absent.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-17T13:01:53.474Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f29d239c34d0947f3eff55
Added to database: 10/17/2025, 7:46:43 PM
Last enriched: 10/17/2025, 8:01:56 PM
Last updated: 10/19/2025, 6:18:05 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
AI Chat Data Is History's Most Thorough Record of Enterprise Secrets. Secure It Wisely
MediumAI Agent Security: Whose Responsibility Is It?
MediumMicrosoft Disrupts Ransomware Campaign Abusing Azure Certificates
MediumMicrosoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign
MediumIdentity Security: Your First and Last Line of Defense
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.