CVE-2026-29058

9.8 CRITICAL

📋 TL;DR

CVE-2026-29058 is a critical remote code execution vulnerability in AVideo video-sharing platform where unauthenticated attackers can execute arbitrary OS commands by injecting shell command substitution into the base64Url GET parameter. This affects all AVideo installations prior to version 7.0, allowing complete server compromise.

💻 Affected Systems

Products:
  • AVideo (WWBN/AVideo-Encoder)
Versions: All versions prior to 7.0
Operating Systems: Any OS running AVideo (Linux, Windows, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server takeover with data exfiltration (credentials, configuration secrets, internal keys), service disruption, and lateral movement to other systems.

🟠

Likely Case

Server compromise leading to data theft, installation of backdoors, and service disruption.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are implemented, though RCE still poses significant risk.

🌐 Internet-Facing: HIGH - Unauthenticated exploit against internet-facing web applications allows remote attackers to compromise servers without any credentials.
🏢 Internal Only: HIGH - Even internally, this vulnerability allows any network user to compromise the server without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit is simple command injection via GET parameter. Public advisory includes technical details making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.0

Vendor Advisory: https://github.com/WWBN/AVideo-Encoder/security/advisories/GHSA-9j26-99jh-v26q

Restart Required: Yes

Instructions:

1. Backup your AVideo installation and database. 2. Download AVideo version 7.0 or later from the official repository. 3. Replace existing installation files with new version. 4. Run any database migration scripts if provided. 5. Restart web server services.

🔧 Temporary Workarounds

Input Validation WAF Rule

all

Implement web application firewall rules to block requests containing shell command substitution patterns in base64Url parameter

# Example ModSecurity rule: SecRule ARGS:base64Url "[;|&`$()]" "id:1001,phase:2,deny,status:403,msg:'Command injection attempt'"
# Example nginx location block: location ~* \.php$ { if ($arg_base64Url ~* [;|&`$()]) { return 403; } }

Network Access Control

linux

Restrict access to AVideo application using network ACLs or firewall rules

# Example iptables rule: iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Immediately isolate the AVideo server from internet and restrict internal network access to only necessary users
  • Implement strict monitoring and alerting for command execution attempts and unusual process activity on the server

🔍 How to Verify

Check if Vulnerable:

Check AVideo version in admin panel or by examining source files. Versions below 7.0 are vulnerable. Test with harmless command injection payload: curl 'http://avideo-server/?base64Url=$(echo+test)'

Check Version:

grep -r "version.*=" /path/to/avideo/installation/ | head -5 or check Admin Panel → About

Verify Fix Applied:

Confirm version is 7.0 or higher in admin panel. Test with same command injection payload should return error or no command execution.

📡 Detection & Monitoring

Log Indicators:

  • Web server logs showing base64Url parameter with shell metacharacters (;, |, &, `, $, (, )) in GET requests
  • System logs showing unexpected command execution or process creation from web server user

Network Indicators:

  • HTTP requests to AVideo endpoints with base64Url parameter containing command substitution patterns
  • Outbound connections from web server to external systems not typical for application

SIEM Query:

source="web_access.log" AND (url="*base64Url=*;*" OR url="*base64Url=*|*" OR url="*base64Url=*&*" OR url="*base64Url=*`*" OR url="*base64Url=*$(*)")

🔗 References

📤 Share & Export