Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2021-47729
Analyzed
More InfoOfficial Page
Source-disclosure@vulncheck.com
View Known Exploited Vulnerability (KEV) details
Published At-09 Dec, 2025 | 21:15
Updated At-23 Feb, 2026 | 19:00

Selea Targa IP OCR-ANPR Camera contains a stored cross-site scripting vulnerability in the 'files_list' parameter that allows attackers to inject malicious HTML and script code. Attackers can send a POST request to /cgi-bin/get_file.php with crafted payload to execute arbitrary scripts in victim's browser session.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.05.1MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.15.4MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Type: Secondary
Version: 4.0
Base score: 5.1
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 5.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CPE Matches

selea
selea
>>izero_box_full_firmware>>-
cpe:2.3:o:selea:izero_box_full_firmware:-:*:*:*:*:*:*:*
selea
selea
>>izero_box_full>>-
cpe:2.3:h:selea:izero_box_full:-:*:*:*:*:*:*:*
selea
selea
>>izero_column_entry\/8_firmware>>-
cpe:2.3:o:selea:izero_column_entry\/8_firmware:-:*:*:*:*:*:*:*
selea
selea
>>izero_column_entry\/8>>-
cpe:2.3:h:selea:izero_column_entry\/8:-:*:*:*:*:*:*:*
selea
selea
>>izero_column_full\/8_firmware>>-
cpe:2.3:o:selea:izero_column_full\/8_firmware:-:*:*:*:*:*:*:*
selea
selea
>>izero_column_full\/8>>-
cpe:2.3:h:selea:izero_column_full\/8:-:*:*:*:*:*:*:*
selea
selea
>>targa_504_firmware>>-
cpe:2.3:o:selea:targa_504_firmware:-:*:*:*:*:*:*:*
selea
selea
>>targa_504>>-
cpe:2.3:h:selea:targa_504:-:*:*:*:*:*:*:*
selea
selea
>>targa_512_firmware>>-
cpe:2.3:o:selea:targa_512_firmware:-:*:*:*:*:*:*:*
selea
selea
>>targa_512>>-
cpe:2.3:h:selea:targa_512:-:*:*:*:*:*:*:*
selea
selea
>>targa_704_ilb_firmware>>-
cpe:2.3:o:selea:targa_704_ilb_firmware:-:*:*:*:*:*:*:*
selea
selea
>>targa_704_ilb>>-
cpe:2.3:h:selea:targa_704_ilb:-:*:*:*:*:*:*:*
selea
selea
>>targa_704_tkm_firmware>>-
cpe:2.3:o:selea:targa_704_tkm_firmware:-:*:*:*:*:*:*:*
selea
selea
>>targa_704_tkm>>-
cpe:2.3:h:selea:targa_704_tkm:-:*:*:*:*:*:*:*
selea
selea
>>targa_710_inox_firmware>>-
cpe:2.3:o:selea:targa_710_inox_firmware:-:*:*:*:*:*:*:*
selea
selea
>>targa_710_inox>>-
cpe:2.3:h:selea:targa_710_inox:-:*:*:*:*:*:*:*
selea
selea
>>targa_750_firmware>>-
cpe:2.3:o:selea:targa_750_firmware:-:*:*:*:*:*:*:*
selea
selea
>>targa_750>>-
cpe:2.3:h:selea:targa_750:-:*:*:*:*:*:*:*
selea
selea
>>targa_805_firmware>>-
cpe:2.3:o:selea:targa_805_firmware:-:*:*:*:*:*:*:*
selea
selea
>>targa_805>>-
cpe:2.3:h:selea:targa_805:-:*:*:*:*:*:*:*
selea
selea
>>targa_semplice_firmware>>-
cpe:2.3:o:selea:targa_semplice_firmware:-:*:*:*:*:*:*:*
selea
selea
>>targa_semplice>>-
cpe:2.3:h:selea:targa_semplice:-:*:*:*:*:*:*:*
selea
selea
>>carplateserver>>3.005\(191112\)
cpe:2.3:a:selea:carplateserver:3.005\(191112\):*:*:*:*:*:*:*
selea
selea
>>carplateserver>>3.005\(191206\)
cpe:2.3:a:selea:carplateserver:3.005\(191206\):*:*:*:*:*:*:*
selea
selea
>>carplateserver>>3.100\(200225\)
cpe:2.3:a:selea:carplateserver:3.100\(200225\):*:*:*:*:*:*:*
selea
selea
>>carplateserver>>4.013\(201105\)
cpe:2.3:a:selea:carplateserver:4.013\(201105\):*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarydisclosure@vulncheck.com
CWE ID: CWE-79
Type: Primary
Source: disclosure@vulncheck.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.exploit-db.com/exploits/49454disclosure@vulncheck.com
Exploit
https://www.selea.comdisclosure@vulncheck.com
Product
https://www.selea.com/product/disclosure@vulncheck.com
Product
https://www.vulncheck.com/advisories/selea-targa-ip-camera-stored-cross-site-scripting-via-files-listdisclosure@vulncheck.com
Third Party Advisory
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5614.phpdisclosure@vulncheck.com
Third Party Advisory
Hyperlink: https://www.exploit-db.com/exploits/49454
Source: disclosure@vulncheck.com
Resource:
Exploit
Hyperlink: https://www.selea.com
Source: disclosure@vulncheck.com
Resource:
Product
Hyperlink: https://www.selea.com/product/
Source: disclosure@vulncheck.com
Resource:
Product
Hyperlink: https://www.vulncheck.com/advisories/selea-targa-ip-camera-stored-cross-site-scripting-via-files-list
Source: disclosure@vulncheck.com
Resource:
Third Party Advisory
Hyperlink: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5614.php
Source: disclosure@vulncheck.com
Resource:
Third Party Advisory
Change History
0Changes found

Details not found