A vulnerability was detected in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. This impacts the function Query of the file /DeviceFault.do?Action=Query. The manipulation of the argument sortField results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/FightingLzn9/vul/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Crocus%E7%B3%BB%E7%BB%9F-4.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.328921 | Permissions Required VDB Entry |
| https://vuldb.com/?id.328921 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.671450 | Third Party Advisory VDB Entry |
Configurations
History
31 Oct 2025, 17:11
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:streamax:streamax_crocus:1.3.40:*:*:*:*:*:*:* | |
| References | () https://github.com/FightingLzn9/vul/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Crocus%E7%B3%BB%E7%BB%9F-4.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.328921 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.328921 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.671450 - Third Party Advisory, VDB Entry | |
| First Time |
Streamax streamax Crocus
Streamax |
17 Oct 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-17 20:15
Updated : 2025-10-31 17:11
NVD link : CVE-2025-11911
Mitre link : CVE-2025-11911
CVE.ORG link : CVE-2025-11911
JSON object : View
Products Affected
streamax
- streamax_crocus
