Description
A security vulnerability has been detected in Shenzhen Ruiming Technology Streamax Crocus bis 1.3.44. Affected is an unknown function of the file /RemoteFormat.do of the component Endpoint. Such manipulation of the argument State leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-27
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: SQL Injection – Potential Data Exposure
Action: Patch Immediately
AI Analysis

Impact

The flaw originates in the /RemoteFormat.do endpoint of Streamax Crocus bis 1.3.44. An attacker can manipulate the State parameter so that untrusted input is concatenated into an SQL query, allowing execution of arbitrary statements. This injection can reveal, alter, or delete data in the backend database depending on its privileges, representing a threat to confidentiality, integrity, and possibly availability. The weakness aligns with input validation and SQL injection categories.

Affected Systems

The only version explicitly identified as vulnerable is Shenzhen Ruiming Technology’s Streamax Crocus bis 1.3.44. No other product revisions are currently listed.

Risk and Exploitability

The CVSS v3.1 base score of 6.9 indicates a medium severity vulnerability. The description confirms that the attack can be performed remotely, likely without the need for local authentication, and the public disclosure suggests that exploitation is possible. While the Exploit Prediction Scoring System score is not available and the issue is not in the CISA Known Exploited Vulnerabilities list, the presence of public exploits indicates that the flaw may already be abused in the wild. Given these factors, the overall risk is significant, and timely remediation is advised.

Generated by OpenCVE AI on March 27, 2026 at 06:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor-released fix or upgrade to a newer, non‑vulnerable Streamax Crocus version.
  • If no patch is available, restrict network access to the device or block the /RemoteFormat.do endpoint entirely.
  • Monitor incoming traffic for suspicious SQL queries or unusual activity on the endpoint.
  • Ensure input validation or parameterization is enforced for the State parameter to mitigate injection attempts.

Generated by OpenCVE AI on March 27, 2026 at 06:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Shenzhen Ruiming Technology
Shenzhen Ruiming Technology streamax Crocus
Vendors & Products Shenzhen Ruiming Technology
Shenzhen Ruiming Technology streamax Crocus

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Shenzhen Ruiming Technology Streamax Crocus bis 1.3.44. Affected is an unknown function of the file /RemoteFormat.do of the component Endpoint. Such manipulation of the argument State leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Shenzhen Ruiming Technology Streamax Crocus Endpoint RemoteFormat.do sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Shenzhen Ruiming Technology Streamax Crocus
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-27T11:23:12.368Z

Reserved: 2026-03-26T16:10:45.133Z

Link: CVE-2026-4910

cve-icon Vulnrichment

Updated: 2026-03-27T11:23:00.690Z

cve-icon NVD

Status : Received

Published: 2026-03-27T04:16:08.043

Modified: 2026-03-27T04:16:08.043

Link: CVE-2026-4910

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:20Z

Weaknesses