Selea Targa IP OCR-ANPR Camera contains an unauthenticated command injection vulnerability in utils.php that allows remote attackers to execute arbitrary shell commands. Attackers can exploit the 'addr' and 'port' parameters to inject commands and gain www-data user access through chained local file inclusion techniques.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Selea carplateserver
Selea izero Box Full Selea izero Box Full Firmware Selea izero Column Entry\/8 Selea izero Column Entry\/8 Firmware Selea izero Column Full\/8 Selea izero Column Full\/8 Firmware Selea targa 504 Selea targa 504 Firmware Selea targa 512 Selea targa 512 Firmware Selea targa 704 Ilb Selea targa 704 Ilb Firmware Selea targa 704 Tkm Selea targa 704 Tkm Firmware Selea targa 710 Inox Selea targa 710 Inox Firmware Selea targa 750 Selea targa 750 Firmware Selea targa 805 Selea targa 805 Firmware Selea targa Semplice Selea targa Semplice Firmware |
|
| CPEs | cpe:2.3:a:selea:carplateserver:3.005\(191112\):*:*:*:*:*:*:* cpe:2.3:a:selea:carplateserver:3.005\(191206\):*:*:*:*:*:*:* cpe:2.3:a:selea:carplateserver:3.100\(200225\):*:*:*:*:*:*:* cpe:2.3:a:selea:carplateserver:4.013\(201105\):*:*:*:*:*:*:* cpe:2.3:h:selea:izero_box_full:-:*:*:*:*:*:*:* cpe:2.3:h:selea:izero_column_entry\/8:-:*:*:*:*:*:*:* cpe:2.3:h:selea:izero_column_full\/8:-:*:*:*:*:*:*:* cpe:2.3:h:selea:targa_504:-:*:*:*:*:*:*:* cpe:2.3:h:selea:targa_512:-:*:*:*:*:*:*:* cpe:2.3:h:selea:targa_704_ilb:-:*:*:*:*:*:*:* cpe:2.3:h:selea:targa_704_tkm:-:*:*:*:*:*:*:* cpe:2.3:h:selea:targa_710_inox:-:*:*:*:*:*:*:* cpe:2.3:h:selea:targa_750:-:*:*:*:*:*:*:* cpe:2.3:h:selea:targa_805:-:*:*:*:*:*:*:* cpe:2.3:h:selea:targa_semplice:-:*:*:*:*:*:*:* cpe:2.3:o:selea:izero_box_full_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:selea:izero_column_entry\/8_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:selea:izero_column_full\/8_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:selea:targa_504_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:selea:targa_512_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:selea:targa_704_ilb_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:selea:targa_704_tkm_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:selea:targa_710_inox_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:selea:targa_750_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:selea:targa_805_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:selea:targa_semplice_firmware:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Selea carplateserver
Selea izero Box Full Selea izero Box Full Firmware Selea izero Column Entry\/8 Selea izero Column Entry\/8 Firmware Selea izero Column Full\/8 Selea izero Column Full\/8 Firmware Selea targa 504 Selea targa 504 Firmware Selea targa 512 Selea targa 512 Firmware Selea targa 704 Ilb Selea targa 704 Ilb Firmware Selea targa 704 Tkm Selea targa 704 Tkm Firmware Selea targa 710 Inox Selea targa 710 Inox Firmware Selea targa 750 Selea targa 750 Firmware Selea targa 805 Selea targa 805 Firmware Selea targa Semplice Selea targa Semplice Firmware |
|
| Metrics |
cvssV3_1
|
Fri, 12 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Selea
Selea targa Ip Ocr-anpr Camera |
|
| Vendors & Products |
Selea
Selea targa Ip Ocr-anpr Camera |
Tue, 09 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Selea Targa IP OCR-ANPR Camera contains an unauthenticated command injection vulnerability in utils.php that allows remote attackers to execute arbitrary shell commands. Attackers can exploit the 'addr' and 'port' parameters to inject commands and gain www-data user access through chained local file inclusion techniques. | |
| Title | Selea Targa IP Camera Remote Code Execution via Utils | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-09T20:44:20.450Z
Updated: 2025-12-12T16:22:08.114Z
Reserved: 2025-12-07T20:10:09.804Z
Link: CVE-2021-47728
Updated: 2025-12-12T16:22:04.043Z
Status : Analyzed
Published: 2025-12-09T21:15:51.243
Modified: 2026-02-23T19:00:13.367
Link: CVE-2021-47728
No data.