Hard-Coded Developer Password Vulnerability in Selea Targa IP OCR-ANPR Camera
CVE-2021-47731

9.3CRITICAL

Key Information:

Vendor
CVE Published:
9 December 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2021-47731?

The Selea Targa IP OCR-ANPR Camera is vulnerable due to a hard-coded developer password that enables unauthorized users to exploit a hidden configuration endpoint. By using the hard-coded password 'Selea781830', attackers can gain access to an undocumented page, allowing them to upload configurations and overwrite critical device settings without authorization. This vulnerability highlights a significant security risk, as it potentially compromises the integrity and functionality of the affected camera.

Affected Version(s)

Selea Targa IP OCR-ANPR Camera Model: iZero

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

LiquidWorm as Gjoko Krstic of Zero Science Lab
.
CVE-2021-47731 : Hard-Coded Developer Password Vulnerability in Selea Targa IP OCR-ANPR Camera