Impact
A path traversal vulnerability exists in the /common/get_file.php script of Selea Targa IP OCR-ANPR cameras. This flaw allows unauthenticated remote users to supply arbitrary file paths via the file parameter, enabling them to read any file on the device. Because system files containing cleartext credentials can be accessed, attackers could bypass authentication and gain full control over the camera and its network services. The weakness is a classic path traversal (CWE-22).
Affected Systems
The affected devices are multiple models of Selea Targa IP OCR-ANPR cameras, including iZero, Targa 512, Targa 504, Targa Semplice, Targa 704 TKM, Targa 805, Targa 710 INOX, Targa 750, and Targa 704 ILB. No specific firmware revision numbers are provided, so any device running those models prior to a vendor‑published fix is potentially vulnerable.
Risk and Exploitability
The CVSS score of 9.3 categorizes the flaw as critical. Although the EPSS score is below 1%, indicating low current exploitation activity, the vulnerability was observed in the wild, and the lack of authentication makes it highly attractive. The attack surface is limited to the camera’s publicly accessible web interface; an attacker only needs to send a crafted HTTP request to the vulnerable script without any credentials. If exploited, the attacker could read arbitrary files, obtain credentials, and subsequently control or disrupt the camera network. The flaw is not currently in CISA’s KEV catalog.
OpenCVE Enrichment
EUVD