Hard-Coded Developer Password Vulnerability in Selea Targa IP OCR-ANPR Camera
CVE-2021-47731
Key Information:
- Vendor
Selea S.r.l.
- Vendor
- CVE Published:
- 9 December 2025
Badges
What is CVE-2021-47731?
The Selea Targa IP OCR-ANPR Camera is vulnerable due to a hard-coded developer password that enables unauthorized users to exploit a hidden configuration endpoint. By using the hard-coded password 'Selea781830', attackers can gain access to an undocumented page, allowing them to upload configurations and overwrite critical device settings without authorization. This vulnerability highlights a significant security risk, as it potentially compromises the integrity and functionality of the affected camera.
Affected Version(s)
Selea Targa IP OCR-ANPR Camera Model: iZero
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
