CVE-2025-11909

6.3 MEDIUM

📋 TL;DR

This CVE describes a SQL injection vulnerability in Shenzhen Ruiming Technology's Streamax Crocus system version 1.3.40. Attackers can manipulate the 'orderField' parameter in the /RepairRecord.do?Action=QueryLast endpoint to execute arbitrary SQL commands. Organizations using this specific version of the Streamax Crocus system are affected.

💻 Affected Systems

Products:
  • Shenzhen Ruiming Technology Streamax Crocus
Versions: 1.3.40
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of version 1.3.40.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data manipulation, and potential remote code execution through database functions.

🟠

Likely Case

Unauthorized data access, data exfiltration, and potential privilege escalation within the database.

🟢

If Mitigated

Limited impact with proper input validation and database permissions restricting damage to non-critical data.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily exploitable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Contact Shenzhen Ruiming Technology for updated version information.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for the orderField parameter to only allow expected values

Web Application Firewall

all

Deploy WAF with SQL injection rules to block malicious requests

🧯 If You Can't Patch

  • Isolate the system from internet access and restrict network access to trusted IPs only
  • Implement database monitoring and alerting for suspicious SQL queries

🔍 How to Verify

Check if Vulnerable:

Check if system is running Streamax Crocus version 1.3.40 and test the /RepairRecord.do?Action=QueryLast endpoint with SQL injection payloads in the orderField parameter

Check Version:

Check system documentation or web interface for version information

Verify Fix Applied:

Test the vulnerable endpoint with SQL injection payloads to confirm they are blocked or sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts following SQL injection patterns
  • Requests to /RepairRecord.do with suspicious orderField parameters

Network Indicators:

  • HTTP requests containing SQL keywords in orderField parameter
  • Unusual database traffic patterns

SIEM Query:

web.url:*RepairRecord.do* AND (web.param.orderField:*SELECT* OR web.param.orderField:*UNION* OR web.param.orderField:*OR*)

🔗 References

📤 Share & Export