Description
A weakness has been identified in Fujian Smart Integrated Management Platform System up to 7.5. Impacted is an unknown function of the file /Module/CRXT/Controller/XCamera.ashx. This manipulation of the argument ChannelName causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Published: 2026-02-20
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to manipulate the ChannelName parameter in the XCamera.ashx endpoint to inject arbitrary SQL commands. When the attack succeeds, the attacker can read, modify or delete data stored in the underlying database, potentially compromising confidentiality, integrity, or availability of system information. The flaw is a classic SQL injection described by CWE‑74 and CWE‑89.

Affected Systems

Fujian Smart Integrated Management Platform System, versions up to 7.5, includes the XCamera.ashx handler under /Module/CRXT/Controller/. The affected function is undocumented, but any installation of the platform prior to 7.5 runs with the vulnerable component.

Risk and Exploitability

The CVSS score is 6.9, indicating a moderate severity. EPSS shows a very low exploitation probability of less than 1%. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to send a specially crafted HTTP request to the vulnerable endpoint, which is reachable from the internet or internal network, and has no known mitigations in place. Consequently, the risk is considered moderate but manageable with prompt remediation.

Generated by OpenCVE AI on April 17, 2026 at 17:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Fujian patch that addresses the XCamera.ashx SQL injection flaw.
  • If a patch is unavailable, restrict or block external access to /Module/CRXT/Controller/XCamera.ashx using the web server or firewall rules.
  • Implement a web application firewall or regex‑based input filtering to reject malicious SQL patterns targeting the ChannelName parameter.

Generated by OpenCVE AI on April 17, 2026 at 17:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Feb 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Fujian
Fujian smart Integrated Management Platform System
Vendors & Products Fujian
Fujian smart Integrated Management Platform System

Fri, 20 Feb 2026 03:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Fujian Smart Integrated Management Platform System up to 7.5. Impacted is an unknown function of the file /Module/CRXT/Controller/XCamera.ashx. This manipulation of the argument ChannelName causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Title Fujian Smart Integrated Management Platform System XCamera.ashx sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Fujian Smart Integrated Management Platform System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:30:19.990Z

Reserved: 2026-02-19T17:17:52.448Z

Link: CVE-2026-2821

cve-icon Vulnrichment

Updated: 2026-02-20T15:32:32.734Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T03:16:02.137

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2821

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:45:24Z

Weaknesses