Impact
The flaw is a classic SSRF that occurs when the camera’s web interface accepts malicious JSON POST data containing fields such as ipnotify_address and url. The internal image‑fetch routine blindly follows these values, enabling an unauthenticated remote attacker to force the device to send arbitrary HTTP requests. This could allow an attacker to probe internal services, exfiltrate data, or bypass firewall rules. The weakness is categorized as CWE‑20 (Improper Input Validation) and CWE‑918 (Server‑Side Request Forgery).
Affected Systems
The issue is reported on Selea’s Targa IP OCR‑ANPR camera line, impacting models including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. No specific firmware or software version information was supplied, so assess all acquired devices for this vulnerability.
Risk and Exploitability
With a CVSS score of 7.8, the vulnerability is classed as high severity. The EPSS score is below 1%, indicating that, at present, the known exploit rate is very low, and the attack is not listed in the CISA KEV catalog. However, the attack vector is remote, unauthenticated, and requires only network access to the camera’s management interface, making exploitation straightforward should a patch not be applied. Given this profile, administrators should treat it as an actionable threat and deploy mitigations promptly.
OpenCVE Enrichment
EUVD