Cross-Site Request Forgery Vulnerability in Selea Targa IP OCR-ANPR Camera
CVE-2021-47730
8.5HIGH
Key Information:
- Vendor
Selea S.r.l.
- Vendor
- CVE Published:
- 9 December 2025
Badges
๐พ Exploit Exists๐ก Public PoC
What is CVE-2021-47730?
The Selea Targa IP OCR-ANPR Camera is susceptible to a cross-site request forgery attack, which enables attackers to create unauthorized administrative users. By tricking a logged-in user into visiting a malicious web page, the attacker can submit a form that adds a new admin without requiring authentication, thereby compromising the device's security and integrity.
Affected Version(s)
Selea Targa IP OCR-ANPR Camera Model: iZero
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
LiquidWorm as Gjoko Krstic of Zero Science Lab
