CVE-2021-47730

8.8 HIGH

📋 TL;DR

Selea Targa IP OCR-ANPR cameras contain a CSRF vulnerability that allows attackers to create administrative accounts without authentication. When a logged-in user visits a malicious webpage, it can automatically submit a form to add a new admin user with full system privileges. This affects all users of vulnerable Selea Targa IP camera systems.

💻 Affected Systems

Products:
  • Selea Targa IP OCR-ANPR Camera
Versions: All versions prior to patching
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface of Selea Targa IP cameras. Requires the camera to be accessible via network and have at least one admin session active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control of the camera system, allowing them to disable security features, manipulate video feeds, access sensitive data, or use the camera as an entry point into the network.

🟠

Likely Case

Unauthorized administrative accounts are created, leading to camera system compromise, surveillance disruption, and potential lateral movement into connected networks.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the camera system itself without network-wide compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires a logged-in admin user to visit a malicious webpage. The exploit code is publicly available on Exploit-DB and GitHub.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with Selea for specific firmware versions

Vendor Advisory: https://www.selea.com

Restart Required: Yes

Instructions:

1. Contact Selea support for latest firmware. 2. Backup camera configuration. 3. Upload new firmware via web interface. 4. Reboot camera. 5. Verify fix by testing admin creation CSRF.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate camera network from user workstations and internet

Browser Security Extensions

all

Install CSRF protection browser extensions for admin users

🧯 If You Can't Patch

  • Place cameras on isolated VLAN with no internet access
  • Implement strict firewall rules to limit camera management interface access to specific IPs only

🔍 How to Verify

Check if Vulnerable:

Test by attempting CSRF attack on admin creation endpoint while logged in as admin

Check Version:

Check firmware version in camera web interface under System > Information

Verify Fix Applied:

Attempt CSRF attack after patch - should fail with proper CSRF token validation

📡 Detection & Monitoring

Log Indicators:

  • Unexpected admin user creation events
  • Multiple failed login attempts followed by successful admin creation

Network Indicators:

  • HTTP POST requests to admin creation endpoint from unexpected sources
  • Cross-origin requests to camera management interface

SIEM Query:

source="camera_logs" AND (event="user_created" OR event="admin_added")

🔗 References

📤 Share & Export