Description
Teradek VidiU Pro 3.0.3 contains a server-side request forgery vulnerability in the management interface that allows attackers to manipulate GET parameters 'url' and 'xml_url'. Attackers can exploit this flaw to bypass firewalls, initiate network enumeration, and potentially trigger external HTTP requests to arbitrary destinations.
Exploits (1)
References (3)
Core 3
Core References
Exploit exploit
https://www.exploit-db.com/exploits/44672
Product product
https://www.teradek.com
Exploit, Third Party Advisory third-party-advisory
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5461.php
Scores
CVSS v3
6.5
EPSS
0.0002
EPSS Percentile
5.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-918
Status
published
Products (9)
teradek/vidiu_firmware
2.4.10
teradek/vidiu_firmware
3.0.2 build31225
teradek/vidiu_firmware
3.0.3 build32136
teradek/vidiu_mini_firmware
2.4.10
teradek/vidiu_mini_firmware
3.0.2 build31225
teradek/vidiu_mini_firmware
3.0.3 build32136
teradek/vidiu_pro_firmware
2.4.10
teradek/vidiu_pro_firmware
3.0.2 build31225
teradek/vidiu_pro_firmware
3.0.3 build32136
Published
Dec 24, 2025
Tracked Since
Feb 18, 2026