{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-11912","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-17T13:01:59.545Z","datePublished":"2025-10-17T20:02:05.763Z","dateUpdated":"2025-10-17T20:27:44.646Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-17T20:02:05.763Z"},"title":"Shenzhen Ruiming Technology Streamax Crocus DeviceState.do Query sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Shenzhen Ruiming Technology","product":"Streamax Crocus","versions":[{"version":"1.3.40","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A flaw has been found in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. Affected is the function Query of the file /DeviceState.do?Action=Query. This manipulation of the argument orderField causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In Shenzhen Ruiming Technology Streamax Crocus 1.3.40 wurde eine Schwachstelle gefunden. Betroffen davon ist die Funktion Query der Datei /DeviceState.do?Action=Query. Mittels Manipulieren des Arguments orderField mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Die Schwachstelle wurde öffentlich offengelegt und könnte ausgenutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-17T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-17T15:07:17.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"nu11 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.328922","name":"VDB-328922 | Shenzhen Ruiming Technology Streamax Crocus DeviceState.do Query sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.328922","name":"VDB-328922 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.671455","name":"Submit #671455 | 深圳市锐明技术股份有限公司 Crocus 1.3.40 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/FightingLzn9/vul/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Crocus%E7%B3%BB%E7%BB%9F-5.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-17T20:27:10.429459Z","id":"CVE-2025-11912","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-17T20:27:44.646Z"}}]}}