CVE-2021-47731

9.8 CRITICAL

📋 TL;DR

Selea Targa IP OCR-ANPR cameras contain a hidden developer backdoor page accessible with hard-coded credentials 'Selea781830'. This allows attackers to upload malicious configuration files and overwrite device settings. All users of affected Selea camera models are vulnerable.

💻 Affected Systems

Products:
  • Selea Targa IP OCR-ANPR Camera
Versions: All versions prior to vendor patch
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The hidden endpoint exists by design for developer access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover enabling camera manipulation, disabling security features, installing persistent malware, or using the device as an internal network pivot point.

🟠

Likely Case

Unauthorized configuration changes, camera functionality disruption, credential harvesting, or integration of the device into a botnet.

🟢

If Mitigated

Limited impact due to network segmentation and access controls preventing external access to camera management interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires knowledge of hidden endpoint URL and hard-coded password. Public exploit code demonstrates configuration upload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.selea.com

Restart Required: No

Instructions:

Contact Selea support for firmware updates. No official patch details are publicly documented.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras on separate VLAN without internet access

Access Control Lists

linux

Block external access to camera management interfaces

iptables -A INPUT -p tcp --dport 80 -s ! trusted_network -j DROP
iptables -A INPUT -p tcp --dport 443 -s ! trusted_network -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate cameras from critical networks
  • Monitor for configuration upload attempts and unauthorized access to camera management interfaces

🔍 How to Verify

Check if Vulnerable:

Attempt to access hidden developer endpoint with hard-coded password 'Selea781830'

Check Version:

Check camera web interface or contact Selea support

Verify Fix Applied:

Verify firmware version against vendor-provided patched version and test that hidden endpoint no longer accepts hard-coded credentials

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with 'Selea781830'
  • Configuration file uploads via unusual endpoints
  • Unusual configuration changes

Network Indicators:

  • HTTP POST requests to undocumented endpoints
  • Traffic to camera management ports from unauthorized sources

SIEM Query:

source="camera_logs" AND (password="Selea781830" OR endpoint="*developer*" OR action="config_upload")

🔗 References

📤 Share & Export