CVE-2025-34433

N/A Unknown

📋 TL;DR

AVideo versions 14.3.1 through 20.0 contain an unauthenticated remote code execution vulnerability. Attackers can exploit predictable installation salt generation to execute arbitrary code on vulnerable systems. All AVideo installations within the affected version range are vulnerable.

💻 Affected Systems

Products:
  • AVideo
Versions: 14.3.1 through 20.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version range are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, install malware, steal data, or pivot to other systems.

🟠

Likely Case

Web server compromise leading to data theft, defacement, or cryptocurrency mining malware installation.

🟢

If Mitigated

Limited impact if proper network segmentation and web application firewalls block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires brute-forcing predictable salt but tools are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.1

Vendor Advisory: https://github.com/WWBN/AVideo/commit/4a53ab2

Restart Required: No

Instructions:

1. Backup your AVideo installation and database. 2. Download AVideo version 20.1 or later from the official repository. 3. Replace all files with the new version. 4. Verify the installation works correctly.

🔧 Temporary Workarounds

Block Unauthenticated API Access

all

Restrict access to vulnerable API endpoints using web server configuration.

# For Apache: add to .htaccess
RewriteCond %{REQUEST_URI} ^/plugin/API/.*$
RewriteRule ^ - [F]
# For Nginx: add to server block
location ~ ^/plugin/API/ { deny all; }

🧯 If You Can't Patch

  • Implement strict network access controls to limit AVideo exposure to trusted networks only.
  • Deploy a web application firewall (WAF) with rules to block RCE exploitation patterns.

🔍 How to Verify

Check if Vulnerable:

Check if AVideo version is between 14.3.1 and 20.0 inclusive. Access /plugin/API/get.json?APIPluginName=installation and check if 'salt' parameter is present in response.

Check Version:

grep -r "version.*=" /path/to/avideo/configuration.php | grep -o '[0-9]\+\.[0-9]\+\.[0-9]\+'

Verify Fix Applied:

Verify AVideo version is 20.1 or later. Confirm /plugin/API/get.json?APIPluginName=installation no longer returns 'salt' parameter.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /plugin/API/ endpoints
  • Multiple failed attempts to access installation-related APIs
  • Web server process spawning unexpected child processes

Network Indicators:

  • Unusual outbound connections from web server
  • HTTP requests with encrypted payloads to notification endpoints

SIEM Query:

source="web_access.log" AND (uri="/plugin/API/get.json" AND query="APIPluginName=installation" OR uri="/plugin/API/set.json" AND query="APIPluginName=notification")

🔗 References

📤 Share & Export