CVE-2025-11914
BaseFortify
Publication date: 2025-10-17
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| streamax | streamax_crocus | 1.3.40 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a path traversal flaw in Shenzhen Ruiming Technology's Streamax Crocus version 1.3.40. It affects the Download function of the endpoint /DeviceFileReport.do?Action=Download. By manipulating the FilePath parameter, an attacker can traverse directories outside the intended restricted directory, allowing unauthorized downloading of arbitrary files from the system. The vulnerability can be exploited remotely without authentication, and a public proof-of-concept exploit is available. [2, 3]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized remote attackers to download arbitrary files from the affected system. This can lead to exposure of sensitive or confidential data, potentially compromising the confidentiality of the system. Since the vulnerability can be exploited without authentication, it poses a significant security risk to the affected environment. [2, 3]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability can negatively affect compliance with standards and regulations such as GDPR and HIPAA because it allows unauthorized access to potentially sensitive or personal data. Exposure of such data due to this flaw could lead to violations of data protection and privacy requirements mandated by these regulations. [2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to exploit the path traversal in the Download function of the endpoint `/DeviceFileReport.do?Action=Download` by manipulating the `FilePath` parameter to access files outside the intended directory. A common detection method is to send HTTP requests with crafted `FilePath` values containing traversal sequences like `../` to see if unauthorized files can be accessed. For example, using curl commands such as: `curl -v "http://<target>/DeviceFileReport.do?Action=Download&FilePath=../../../../etc/passwd"` to check if sensitive files can be downloaded. Monitoring logs for unusual requests to this endpoint with suspicious `FilePath` parameters can also help detect exploitation attempts. [2, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable endpoint `/DeviceFileReport.do?Action=Download` by implementing network-level controls such as firewall rules or access control lists to limit who can reach this service. Additionally, monitor and block suspicious requests containing path traversal patterns in the `FilePath` parameter. Since no vendor patch or official mitigation is available, consider replacing the affected product or isolating it from untrusted networks. Applying strict input validation or web application firewall (WAF) rules to detect and block path traversal attempts can also reduce risk. [3]