Tattile Cameras 1.181.5 Unauthenticated RTSP Stream Disclosure

Title: Tattile Cameras 1.181.5 Unauthenticated RTSP Stream Disclosure
Advisory ID: ZSL-2026-5978
Type: Local/Remote
Impact: Exposure of System Information, Exposure of Sensitive Information
Risk: (3/5)
Release Date: 24.02.2026
Summary
Tattile is an Italian manufacturer specializing in advanced ANPR/ALPR, traffic‑enforcement, and machine‑vision camera systems used across intelligent transportation networks, tolling infrastructures, access‑control environments, and industrial automation. Their portfolio includes high‑performance ITS cameras capable of vehicle identification, speed and red‑light enforcement, free‑flow tolling, and multi‑lane traffic monitoring, as well as compact ANPR units for parking and perimeter control, and industrial smart cameras for inspection and quality assurance. Across all model families, Tattile devices combine ruggedized hardware with onboard image processing, AI‑based vehicle analytics, and high‑sensitivity sensors designed for continuous operation in demanding outdoor conditions, making them critical components in modern traffic management and enforcement architectures.
Description
The Tattile cameras suffer from an unauthenticated and unauthorized live RTSP video stream access.
Vendor
Tattile s.r.l. - https://www.tattile.com
Affected Version
Smart+ family: Smart+
Tolling+
Smart+ Speed
Smart+ Traffic Light
Vega family: Axle Counter
Vega 53
Vega33 & Vega 11
Basic family: Basic MK2
ANPR Mobile
Firmware: 1.181.5
Tested On
lighttpd/1.4.64
Vendor Status
[22.01.2026] Vulnerability discovered.
[22.01.2026] Vendor contacted.
[23.01.2026] Vendor responds asking for account registration on their Academy portal and submitting a ticket.
[23.01.2026] Responded to the vendor, sent details and asked for further planning.
[26.01.2026] Working with the vendor.
[06.02.2026] Asked vendor for status update.
[10.02.2026] Vendor is assessing the problem.
[11.02.2026] Vendor confirms the vulnerability, shares patch planning in May, 2026.
[18.02.2026] Vendor confirms other vulnerabilities, all scheduled to be patched in week 19.
[18.02.2026] Provided 3 CVEs to the vendor and asked for latest firmware version and affected models for confirmation.
[20.02.2026] Vendor confirms all models affected by the 3 CVEs, provides current vulnerable firmware version information 1.181.5.
[20.02.2026] Responded to the vendor.
[23.02.2026] Sent draft advisories to the vendor for review/comments.
[24.02.2026] Public security advisory released.
PoC
tattile_rtsp.txt
Credits
Vulnerability discovered by Gjoko Krstic - <[email protected]>
References
[1] https://www.cve.org/CVERecord?id=CVE-2026-26340
Changelog
[24.02.2026] - Initial release
Contact
Zero Science Lab

Web: https://www.zeroscience.mk
e-mail: [email protected]