Server-Side Request Forgery Vulnerability in Selea Targa IP Cameras
CVE-2025-34021
Key Information:
- Vendor
Selea
- Status
- Vendor
- CVE Published:
- 20 June 2025
Badges
What is CVE-2025-34021?
A server-side request forgery vulnerability has been identified in various Selea Targa IP OCR-ANPR camera models. This vulnerability arises from insufficient validation of user-supplied input in JSON POST parameters, such as ipnotify_address and url. As a result, attackers may exploit this flaw to send arbitrary HTTP requests, enabling access to both internal and external systems. The potential consequences include circumvention of firewall policies and the ability to conduct unauthorized internal service enumeration, exposing sensitive information and further system vulnerabilities.
Affected Version(s)
Targa IP OCR-ANPR Camera BLD201113005214
Targa IP OCR-ANPR Camera BLD201106163745
Targa IP OCR-ANPR Camera BLD200304170901
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved