Submeter #777534: Shenzhen Ruiming Technology Co., Ltd. Streamax Crocus O&M Platform 1.3.44 SQL Injectioninformação

TítuloShenzhen Ruiming Technology Co., Ltd. Streamax Crocus O&M Platform 1.3.44 SQL Injection
DescriçãoA critical SQL injection vulnerability exists in the Streamax Crocus O&M Platform. The application fails to properly validate the State parameter in the DevicePrint.do component. An attacker can bypass the login requirement by providing a forged base64-encoded cookie Saffron.U="VUlEPTE=" (decodes to UID=1). This allows a remote, unauthenticated attacker to execute arbitrary SQL commands. By using time-based blind injection techniques (e.g., BENCHMARK or SLEEP), the attacker can extract sensitive system data and potentially compromise the entire database server.
Fonte⚠️ https://my.feishu.cn/docx/J8fHdY906o98pax4oCacWLTKndP?from=from_copylink
Utilizador
 0menc (UID 75423)
Submissão11/03/2026 10h24 (há 21 dias)
Moderação27/03/2026 08h55 (16 days later)
EstadoAceite
Entrada VulDB353833 [Shenzhen Ruiming Technology Streamax Crocus 1.3.44 Parameter DevicePrint.do?Action=ReadTask State Injeção SQL]
Pontos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!