Path Traversal Vulnerability in Selea Targa IP Cameras
CVE-2025-34022

9.3CRITICAL

Key Information:

Vendor

Selea

Vendor
CVE Published:
20 June 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-34022?

A vulnerability has been identified in various models of Selea Targa IP OCR-ANPR cameras where the /common/get_file.php script fails to accurately validate user-supplied input, allowing unauthenticated remote attackers to exploit this weakness. This exploitation enables unauthorized access to sensitive files on the device, such as system files that may include cleartext credentials. As a result, an attacker could potentially bypass authentication and gain access to critical system information, raising serious security concerns for users.

Affected Version(s)

Targa IP OCR-ANPR Camera BLD201113005214

Targa IP OCR-ANPR Camera BLD201106163745

Targa IP OCR-ANPR Camera BLD200304170901

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Gjoko Krstic
.
CVE-2025-34022 : Path Traversal Vulnerability in Selea Targa IP Cameras