Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11910: SQL Injection in Shenzhen Ruiming Technology Streamax Crocus

0
Medium
VulnerabilityCVE-2025-11910cvecve-2025-11910
Published: Fri Oct 17 2025 (10/17/2025, 19:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Ruiming Technology
Product: Streamax Crocus

Description

A security vulnerability has been detected in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. This affects the function Query of the file /MemoryState.do?Action=Query. The manipulation of the argument orderField leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/17/2025, 20:01:56 UTC

Technical Analysis

CVE-2025-11910 is a SQL injection vulnerability identified in version 1.3.40 of Shenzhen Ruiming Technology's Streamax Crocus software. The vulnerability resides in the Query function accessed via the /MemoryState.do?Action=Query endpoint, specifically through the orderField parameter. This parameter is not properly sanitized or validated, allowing an attacker to inject arbitrary SQL code remotely without requiring authentication or user interaction. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact vector includes low confidentiality, integrity, and availability impacts, suggesting partial but not full compromise potential. The vendor was notified early but has not responded or released patches, and no known exploits are currently observed in the wild. The vulnerability could be exploited to extract sensitive data, modify database contents, or disrupt service availability by manipulating backend database queries. This type of injection flaw is critical in web applications interfacing with databases, especially in surveillance or monitoring systems like Streamax Crocus, which may handle sensitive video or metadata. The lack of vendor response increases the risk profile, requiring organizations to implement immediate mitigations and monitoring.

Potential Impact

For European organizations, the SQL injection vulnerability in Streamax Crocus poses risks to data confidentiality, integrity, and availability. Exploitation could lead to unauthorized data disclosure, including sensitive surveillance data or operational metadata, potentially violating GDPR and other data protection regulations. Integrity of stored data could be compromised, affecting the reliability of surveillance records or system logs. Availability impacts could disrupt surveillance operations, critical in sectors such as transportation, public safety, or utilities. Given the remote exploitability without authentication, attackers could leverage this vulnerability to gain footholds in networks, escalate privileges, or move laterally. The absence of vendor patches and public exploit code increases urgency for defensive measures. Organizations relying on Streamax Crocus for security monitoring or operational control should assess exposure and implement compensating controls to prevent data breaches or operational disruptions.

Mitigation Recommendations

1. Immediately restrict network access to the /MemoryState.do?Action=Query endpoint using firewall rules or network segmentation to limit exposure to trusted hosts only. 2. Deploy and configure Web Application Firewalls (WAFs) with SQL injection detection and prevention capabilities to block malicious payloads targeting the orderField parameter. 3. Conduct thorough input validation and sanitization on all user-supplied parameters, especially orderField, if custom modifications or patches are possible. 4. Monitor application logs and network traffic for unusual query patterns or error messages indicative of SQL injection attempts. 5. If possible, isolate the Streamax Crocus system from critical networks until a vendor patch or official fix is available. 6. Engage with Shenzhen Ruiming Technology for updates and request a security patch or mitigation guidance. 7. Review and enhance database user privileges to follow the principle of least privilege, limiting the damage potential of injected queries. 8. Prepare incident response plans specific to database compromise scenarios involving Streamax Crocus. 9. Consider alternative or additional surveillance solutions if patching is delayed or vendor support remains absent.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-17T13:01:53.474Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f29d239c34d0947f3eff55

Added to database: 10/17/2025, 7:46:43 PM

Last enriched: 10/17/2025, 8:01:56 PM

Last updated: 10/19/2025, 6:18:05 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats