CVE-2025-11914

A vulnerability was found in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. Affected by this issue is the function Download of the file /DeviceFileReport.do?Action=Download. Performing manipulation of the argument FilePath results in path traversal. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

cpe:2.3:a:streamax:streamax_crocus:1.3.40:*:*:*:*:*:*:*

History

31 Oct 2025, 16:58

Type Values Removed Values Added
References () https://github.com/FightingLzn9/vul/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Crocus%E7%B3%BB%E7%BB%9F-7.md - () https://github.com/FightingLzn9/vul/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Crocus%E7%B3%BB%E7%BB%9F-7.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.328924 - () https://vuldb.com/?ctiid.328924 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.328924 - () https://vuldb.com/?id.328924 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.671483 - () https://vuldb.com/?submit.671483 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:streamax:streamax_crocus:1.3.40:*:*:*:*:*:*:*
First Time Streamax streamax Crocus
Streamax

17 Oct 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-17 21:15

Updated : 2025-10-31 16:58


NVD link : CVE-2025-11914

Mitre link : CVE-2025-11914

CVE.ORG link : CVE-2025-11914


JSON object : View

Products Affected

streamax

  • streamax_crocus
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')