{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-11913","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-10-17T13:02:02.420Z","datePublished":"2025-10-17T20:02:08.285Z","dateUpdated":"2025-10-17T20:30:04.588Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-10-17T20:02:08.285Z"},"title":"Shenzhen Ruiming Technology Streamax Crocus Service.do download path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"Shenzhen Ruiming Technology","product":"Streamax Crocus","versions":[{"version":"1.3.40","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in Shenzhen Ruiming Technology Streamax Crocus 1.3.40. Affected by this vulnerability is the function Download of the file /Service.do?Action=Download. Such manipulation of the argument Path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In Shenzhen Ruiming Technology Streamax Crocus 1.3.40 ist eine Schwachstelle entdeckt worden. Betroffen hiervon ist die Funktion Download der Datei /Service.do?Action=Download. Durch das Manipulieren des Arguments Path mit unbekannten Daten kann eine path traversal-Schwachstelle ausgenutzt werden. Der Angriff kann remote ausgeführt werden. Der Exploit ist öffentlich verfügbar und könnte genutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-10-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-10-17T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-10-17T15:07:18.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"nu11 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.328923","name":"VDB-328923 | Shenzhen Ruiming Technology Streamax Crocus Service.do download path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.328923","name":"VDB-328923 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.671480","name":"Submit #671480 | 深圳市锐明技术股份有限公司 Crocus 1.3.40 Download of Code Without Integrity Check","tags":["third-party-advisory"]},{"url":"https://github.com/FightingLzn9/vul/blob/main/%E6%B7%B1%E5%9C%B3%E5%B8%82%E9%94%90%E6%98%8E%E6%8A%80%E6%9C%AF%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8Crocus%E7%B3%BB%E7%BB%9F-6.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-17T20:29:48.176133Z","id":"CVE-2025-11913","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-17T20:30:04.588Z"}}]}}