Home

Description

EN DE

A security vulnerability has been detected in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. This affects the function Query of the file /MemoryState.do?Action=Query. The manipulation of the argument orderField leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Eine Schwachstelle wurde in Shenzhen Ruiming Technology Streamax Crocus 1.3.40 gefunden. Hiervon betroffen ist die Funktion Query der Datei /MemoryState.do?Action=Query. Durch Manipulation des Arguments orderField mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Ein Angriff ist aus der Distanz möglich. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-10-17 | Published 2025-10-17 | Updated 2025-10-17 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

SQL Injection

Injection

Product status

1.3.40
affected

Timeline

2025-10-17:Advisory disclosed
2025-10-17:VulDB entry created
2025-10-17:VulDB entry last update

Credits

nu11 (VulDB User) reporter

References

vuldb.com/?id.328920 (VDB-328920 | Shenzhen Ruiming Technology Streamax Crocus MemoryState.do query sql injection) vdb-entry technical-description

vuldb.com/?ctiid.328920 (VDB-328920 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.671437 (Submit #671437 | 深圳市锐明技术股份有限公司 Crocus 1.3.40 SQL Injection) third-party-advisory

github.com/...明技术股份有限公司Crocus系统-3.md exploit

cve.org (CVE-2025-11910)

nvd.nist.gov (CVE-2025-11910)

Download JSON