Search criteria

4 vulnerabilities found for Targa IP OCR-ANPR Camera by Selea

CVE-2025-34022 (GCVE-0-2025-34022)

Vulnerability from cvelistv5 – Published: 2025-06-20 18:37 – Updated: 2025-11-20 21:27 X_Known Exploited Vulnerability
VLAI?
Title
Selea Targa IP OCR-ANPR Camera Path Traversal
Summary
A path traversal vulnerability exists in multiple models of Selea Targa IP OCR-ANPR cameras, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The /common/get_file.php script in the “Download Archive in Storage” page fails to properly validate user-supplied input to the file parameter. Unauthenticated remote attackers can exploit this vulnerability to read arbitrary files on the device, including sensitive system files containing cleartext credentials, potentially leading to authentication bypass and exposure of system information. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
Vendor Product Version
Selea Targa IP OCR-ANPR Camera Affected: BLD201113005214 (custom)
Affected: BLD201106163745 (custom)
Affected: BLD200304170901 (custom)
Affected: BLD200304170514 (custom)
Affected: BLD200303143345 (custom)
Affected: BLD191118145435 (custom)
Affected: BLD191021180140 (custom)
Affected: CPS 4.013(201105) (custom)
Affected: CPS 3.100(200225) (custom)
Affected: CPS 3.005(191206) (custom)
Affected: CPS 3.005(191112) (custom)
Create a notification for this product.
Credits
Gjoko Krstic
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-34022",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-23T20:36:01.210675Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-23T20:36:31.263Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Web Management Interface (get_file.php download handler)"
          ],
          "product": "Targa IP OCR-ANPR Camera",
          "vendor": "Selea",
          "versions": [
            {
              "status": "affected",
              "version": "BLD201113005214",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD201106163745",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200304170901",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200304170514",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200303143345",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD191118145435",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD191021180140",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 4.013(201105)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.100(200225)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.005(191206)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.005(191112)",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Gjoko Krstic"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A path traversal vulnerability exists in multiple models of Selea Targa IP OCR-ANPR cameras, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The /common/get_file.php script in the \u201cDownload Archive in Storage\u201d page fails to properly validate user-supplied input to the file parameter. Unauthenticated remote attackers can exploit this vulnerability to read arbitrary files on the device, including sensitive system files containing cleartext credentials, potentially leading to authentication bypass and exposure of system information.\u0026nbsp;Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC."
            }
          ],
          "value": "A path traversal vulnerability exists in multiple models of Selea Targa IP OCR-ANPR cameras, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The /common/get_file.php script in the \u201cDownload Archive in Storage\u201d page fails to properly validate user-supplied input to the file parameter. Unauthenticated remote attackers can exploit this vulnerability to read arbitrary files on the device, including sensitive system files containing cleartext credentials, potentially leading to authentication bypass and exposure of system information.\u00a0Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-20T21:27:15.482Z",
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5616.php"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://packetstorm.news/files/id/161057"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://cxsecurity.com/issue/WLB-2021010165"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://www.exploit-db.com/exploits/49456"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.selea.com"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vulncheck.com/advisories/selea-targa-ip-camera-path-traversal"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "x_known-exploited-vulnerability"
      ],
      "title": "Selea Targa IP OCR-ANPR Camera Path Traversal",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "cveId": "CVE-2025-34022",
    "datePublished": "2025-06-20T18:37:23.460Z",
    "dateReserved": "2025-04-15T19:15:22.545Z",
    "dateUpdated": "2025-11-20T21:27:15.482Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-34021 (GCVE-0-2025-34021)

Vulnerability from cvelistv5 – Published: 2025-06-20 18:37 – Updated: 2025-11-20 21:28 X_Known Exploited Vulnerability
VLAI?
Title
Selea Targa IP OCR-ANPR Camera Server-Side Request Forgery
Summary
A server-side request forgery (SSRF) vulnerability exists in multiple Selea Targa IP OCR-ANPR camera models, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The application fails to validate user-supplied input in JSON POST parameters such as ipnotify_address and url, which are used by internal mechanisms to perform image fetch and DNS lookups. This allows remote unauthenticated attackers to induce the system to make arbitrary HTTP requests to internal or external systems, potentially bypassing firewall policies or conducting internal service enumeration. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-25 UTC.
CWE
  • CWE-918 - Server-Side Request Forgery (SSRF)
  • CWE-20 - Improper Input Validation
Assigner
References
Impacted products
Vendor Product Version
Selea Targa IP OCR-ANPR Camera Affected: BLD201113005214 (custom)
Affected: BLD201106163745 (custom)
Affected: BLD200304170901 (custom)
Affected: BLD200304170514 (custom)
Affected: BLD200303143345 (custom)
Affected: BLD191118145435 (custom)
Affected: BLD191021180140 (custom)
Affected: CPS 4.013(201105) (custom)
Affected: CPS 3.100(200225) (custom)
Affected: CPS 3.005(191206) (custom)
Affected: CPS 3.005(191112) (custom)
Create a notification for this product.
Credits
Gjoko Krstic
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-34021",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-23T20:35:13.561170Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-23T20:35:27.600Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Web Management Interface (IP notification and image retrieval handlers)"
          ],
          "product": "Targa IP OCR-ANPR Camera",
          "vendor": "Selea",
          "versions": [
            {
              "status": "affected",
              "version": "BLD201113005214",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD201106163745",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200304170901",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200304170514",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200303143345",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD191118145435",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD191021180140",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 4.013(201105)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.100(200225)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.005(191206)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.005(191112)",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Gjoko Krstic"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A server-side request forgery (SSRF) vulnerability exists in multiple Selea Targa IP OCR-ANPR camera models, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The application fails to validate user-supplied input in JSON POST parameters such as ipnotify_address and url, which are used by internal mechanisms to perform image fetch and DNS lookups. This allows remote unauthenticated attackers to induce the system to make arbitrary HTTP requests to internal or external systems, potentially bypassing firewall policies or conducting internal service enumeration.\u0026nbsp;Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-25 UTC."
            }
          ],
          "value": "A server-side request forgery (SSRF) vulnerability exists in multiple Selea Targa IP OCR-ANPR camera models, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The application fails to validate user-supplied input in JSON POST parameters such as ipnotify_address and url, which are used by internal mechanisms to perform image fetch and DNS lookups. This allows remote unauthenticated attackers to induce the system to make arbitrary HTTP requests to internal or external systems, potentially bypassing firewall policies or conducting internal service enumeration.\u00a0Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-25 UTC."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-664",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-664 Server Side Request Forgery"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "LOW",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-918",
              "description": "CWE-918 Server-Side Request Forgery (SSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-20T21:28:44.306Z",
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5617.php"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://www.exploit-db.com/exploits/49457"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://cxsecurity.com/issue/WLB-2021010170"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://packetstorm.news/files/id/161059"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.selea.com"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vulncheck.com/advisories/selea-targa-ip-camera-ssrf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "x_known-exploited-vulnerability"
      ],
      "title": "Selea Targa IP OCR-ANPR Camera Server-Side Request Forgery",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "cveId": "CVE-2025-34021",
    "datePublished": "2025-06-20T18:37:00.916Z",
    "dateReserved": "2025-04-15T19:15:22.545Z",
    "dateUpdated": "2025-11-20T21:28:44.306Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-34022 (GCVE-0-2025-34022)

Vulnerability from nvd – Published: 2025-06-20 18:37 – Updated: 2025-11-20 21:27 X_Known Exploited Vulnerability
VLAI?
Title
Selea Targa IP OCR-ANPR Camera Path Traversal
Summary
A path traversal vulnerability exists in multiple models of Selea Targa IP OCR-ANPR cameras, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The /common/get_file.php script in the “Download Archive in Storage” page fails to properly validate user-supplied input to the file parameter. Unauthenticated remote attackers can exploit this vulnerability to read arbitrary files on the device, including sensitive system files containing cleartext credentials, potentially leading to authentication bypass and exposure of system information. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
Vendor Product Version
Selea Targa IP OCR-ANPR Camera Affected: BLD201113005214 (custom)
Affected: BLD201106163745 (custom)
Affected: BLD200304170901 (custom)
Affected: BLD200304170514 (custom)
Affected: BLD200303143345 (custom)
Affected: BLD191118145435 (custom)
Affected: BLD191021180140 (custom)
Affected: CPS 4.013(201105) (custom)
Affected: CPS 3.100(200225) (custom)
Affected: CPS 3.005(191206) (custom)
Affected: CPS 3.005(191112) (custom)
Create a notification for this product.
Credits
Gjoko Krstic
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-34022",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-23T20:36:01.210675Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-23T20:36:31.263Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Web Management Interface (get_file.php download handler)"
          ],
          "product": "Targa IP OCR-ANPR Camera",
          "vendor": "Selea",
          "versions": [
            {
              "status": "affected",
              "version": "BLD201113005214",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD201106163745",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200304170901",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200304170514",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200303143345",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD191118145435",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD191021180140",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 4.013(201105)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.100(200225)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.005(191206)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.005(191112)",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Gjoko Krstic"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A path traversal vulnerability exists in multiple models of Selea Targa IP OCR-ANPR cameras, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The /common/get_file.php script in the \u201cDownload Archive in Storage\u201d page fails to properly validate user-supplied input to the file parameter. Unauthenticated remote attackers can exploit this vulnerability to read arbitrary files on the device, including sensitive system files containing cleartext credentials, potentially leading to authentication bypass and exposure of system information.\u0026nbsp;Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC."
            }
          ],
          "value": "A path traversal vulnerability exists in multiple models of Selea Targa IP OCR-ANPR cameras, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The /common/get_file.php script in the \u201cDownload Archive in Storage\u201d page fails to properly validate user-supplied input to the file parameter. Unauthenticated remote attackers can exploit this vulnerability to read arbitrary files on the device, including sensitive system files containing cleartext credentials, potentially leading to authentication bypass and exposure of system information.\u00a0Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-126",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-126 Path Traversal"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-20T21:27:15.482Z",
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5616.php"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://packetstorm.news/files/id/161057"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://cxsecurity.com/issue/WLB-2021010165"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://www.exploit-db.com/exploits/49456"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.selea.com"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vulncheck.com/advisories/selea-targa-ip-camera-path-traversal"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "x_known-exploited-vulnerability"
      ],
      "title": "Selea Targa IP OCR-ANPR Camera Path Traversal",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "cveId": "CVE-2025-34022",
    "datePublished": "2025-06-20T18:37:23.460Z",
    "dateReserved": "2025-04-15T19:15:22.545Z",
    "dateUpdated": "2025-11-20T21:27:15.482Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-34021 (GCVE-0-2025-34021)

Vulnerability from nvd – Published: 2025-06-20 18:37 – Updated: 2025-11-20 21:28 X_Known Exploited Vulnerability
VLAI?
Title
Selea Targa IP OCR-ANPR Camera Server-Side Request Forgery
Summary
A server-side request forgery (SSRF) vulnerability exists in multiple Selea Targa IP OCR-ANPR camera models, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The application fails to validate user-supplied input in JSON POST parameters such as ipnotify_address and url, which are used by internal mechanisms to perform image fetch and DNS lookups. This allows remote unauthenticated attackers to induce the system to make arbitrary HTTP requests to internal or external systems, potentially bypassing firewall policies or conducting internal service enumeration. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-25 UTC.
CWE
  • CWE-918 - Server-Side Request Forgery (SSRF)
  • CWE-20 - Improper Input Validation
Assigner
References
Impacted products
Vendor Product Version
Selea Targa IP OCR-ANPR Camera Affected: BLD201113005214 (custom)
Affected: BLD201106163745 (custom)
Affected: BLD200304170901 (custom)
Affected: BLD200304170514 (custom)
Affected: BLD200303143345 (custom)
Affected: BLD191118145435 (custom)
Affected: BLD191021180140 (custom)
Affected: CPS 4.013(201105) (custom)
Affected: CPS 3.100(200225) (custom)
Affected: CPS 3.005(191206) (custom)
Affected: CPS 3.005(191112) (custom)
Create a notification for this product.
Credits
Gjoko Krstic
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-34021",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-23T20:35:13.561170Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-23T20:35:27.600Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Web Management Interface (IP notification and image retrieval handlers)"
          ],
          "product": "Targa IP OCR-ANPR Camera",
          "vendor": "Selea",
          "versions": [
            {
              "status": "affected",
              "version": "BLD201113005214",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD201106163745",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200304170901",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200304170514",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD200303143345",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD191118145435",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "BLD191021180140",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 4.013(201105)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.100(200225)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.005(191206)",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "CPS 3.005(191112)",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Gjoko Krstic"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A server-side request forgery (SSRF) vulnerability exists in multiple Selea Targa IP OCR-ANPR camera models, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The application fails to validate user-supplied input in JSON POST parameters such as ipnotify_address and url, which are used by internal mechanisms to perform image fetch and DNS lookups. This allows remote unauthenticated attackers to induce the system to make arbitrary HTTP requests to internal or external systems, potentially bypassing firewall policies or conducting internal service enumeration.\u0026nbsp;Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-25 UTC."
            }
          ],
          "value": "A server-side request forgery (SSRF) vulnerability exists in multiple Selea Targa IP OCR-ANPR camera models, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. The application fails to validate user-supplied input in JSON POST parameters such as ipnotify_address and url, which are used by internal mechanisms to perform image fetch and DNS lookups. This allows remote unauthenticated attackers to induce the system to make arbitrary HTTP requests to internal or external systems, potentially bypassing firewall policies or conducting internal service enumeration.\u00a0Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-25 UTC."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-664",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-664 Server Side Request Forgery"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "exploitMaturity": "NOT_DEFINED",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "LOW",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-918",
              "description": "CWE-918 Server-Side Request Forgery (SSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-20T21:28:44.306Z",
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5617.php"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://www.exploit-db.com/exploits/49457"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://cxsecurity.com/issue/WLB-2021010170"
        },
        {
          "tags": [
            "third-party-advisory",
            "exploit"
          ],
          "url": "https://packetstorm.news/files/id/161059"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.selea.com"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vulncheck.com/advisories/selea-targa-ip-camera-ssrf"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "tags": [
        "x_known-exploited-vulnerability"
      ],
      "title": "Selea Targa IP OCR-ANPR Camera Server-Side Request Forgery",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "cveId": "CVE-2025-34021",
    "datePublished": "2025-06-20T18:37:00.916Z",
    "dateReserved": "2025-04-15T19:15:22.545Z",
    "dateUpdated": "2025-11-20T21:28:44.306Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}