CVE-2019-25251

MEDIUM

Teradek VidiU Pro 3.0.3 - SSRF

Title source: llm
STIX 2.1

Description

Teradek VidiU Pro 3.0.3 contains a server-side request forgery vulnerability in the management interface that allows attackers to manipulate GET parameters 'url' and 'xml_url'. Attackers can exploit this flaw to bypass firewalls, initiate network enumeration, and potentially trigger external HTTP requests to arbitrary destinations.

Exploits (1)

exploitdb WORKING POC
by LiquidWorm · textwebappshardware
https://www.exploit-db.com/exploits/44672

References (3)

Core 3
Core References
Product product
https://www.teradek.com
Exploit, Third Party Advisory third-party-advisory
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5461.php

Scores

CVSS v3 6.5
EPSS 0.0002
EPSS Percentile 5.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-918
Status published
Products (9)
teradek/vidiu_firmware 2.4.10
teradek/vidiu_firmware 3.0.2 build31225
teradek/vidiu_firmware 3.0.3 build32136
teradek/vidiu_mini_firmware 2.4.10
teradek/vidiu_mini_firmware 3.0.2 build31225
teradek/vidiu_mini_firmware 3.0.3 build32136
teradek/vidiu_pro_firmware 2.4.10
teradek/vidiu_pro_firmware 3.0.2 build31225
teradek/vidiu_pro_firmware 3.0.3 build32136
Published Dec 24, 2025
Tracked Since Feb 18, 2026