Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11913: Path Traversal in Shenzhen Ruiming Technology Streamax Crocus

0
Medium
VulnerabilityCVE-2025-11913cvecve-2025-11913
Published: Fri Oct 17 2025 (10/17/2025, 20:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Ruiming Technology
Product: Streamax Crocus

Description

A vulnerability has been found in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. Affected by this vulnerability is the function Download of the file /Service.do?Action=Download. Such manipulation of the argument Path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/17/2025, 20:31:43 UTC

Technical Analysis

CVE-2025-11913 identifies a path traversal vulnerability in Shenzhen Ruiming Technology's Streamax Crocus software version 1.3.40. The vulnerability resides in the Download function accessible via the endpoint /Service.do?Action=Download, where the Path parameter is insufficiently sanitized. This allows an attacker to manipulate the Path argument to traverse directories outside the intended file scope, potentially accessing arbitrary files on the server's filesystem. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 score is 5.3 (medium), reflecting the ease of exploitation but limited impact on integrity and availability. The vendor was contacted but has not issued a patch or mitigation guidance. The public disclosure of an exploit means attackers can leverage this vulnerability to access sensitive configuration files, credentials, or other critical data stored on affected systems. This could lead to information disclosure, further compromise, or lateral movement within networks. The affected product is primarily used in video surveillance and security monitoring, making confidentiality breaches particularly sensitive. No known active exploitation in the wild has been reported yet, but the presence of a public exploit increases the urgency for defensive measures.

Potential Impact

For European organizations, especially those in critical infrastructure, public safety, and private security sectors relying on Streamax Crocus 1.3.40, this vulnerability poses a significant confidentiality risk. Unauthorized file access could expose sensitive surveillance footage, configuration files, or credentials, potentially leading to privacy violations or enabling further attacks such as privilege escalation or lateral movement. The lack of vendor response and patch increases exposure duration. Organizations operating in regulated environments (e.g., GDPR) face compliance risks if personal data is exposed. The remote, unauthenticated nature of the exploit means attackers can target exposed systems directly, increasing the attack surface. Disruption to surveillance operations could also indirectly impact physical security. While availability and integrity impacts are limited, the confidentiality breach potential and ease of exploitation make this a notable threat for European entities using this product.

Mitigation Recommendations

1. Immediately restrict network access to the affected Streamax Crocus management interfaces using firewalls or network segmentation, allowing only trusted IPs to connect. 2. Implement strict input validation and filtering at the web application firewall (WAF) level to detect and block path traversal patterns targeting the /Service.do?Action=Download endpoint. 3. Monitor logs for suspicious requests containing directory traversal sequences (e.g., ../) and unusual file access patterns. 4. Disable or restrict the Download functionality if not essential for operations until a vendor patch is available. 5. Conduct a thorough audit of exposed files and systems to identify any unauthorized access or data leakage. 6. Engage with Shenzhen Ruiming Technology for patch timelines and subscribe to vulnerability advisories for updates. 7. Consider deploying endpoint detection and response (EDR) tools to detect lateral movement or exploitation attempts stemming from this vulnerability. 8. Educate security teams about this specific vulnerability to enhance incident detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-17T13:02:02.420Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f2a4339c34d0947f40c74a

Added to database: 10/17/2025, 8:16:51 PM

Last enriched: 10/17/2025, 8:31:43 PM

Last updated: 10/19/2025, 6:45:29 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats