CVE-2023-34105

HIGH EXPLOITED NUCLEI

SRS <5.0.157, <5.0-b1, <6.0.48 - Command Injection

Title source: llm

Description

SRS is a real-time video server supporting RTMP, WebRTC, HLS, HTTP-FLV, SRT, MPEG-DASH, and GB28181. Prior to versions 5.0.157, 5.0-b1, and 6.0.48, SRS's `api-server` server is vulnerable to a drive-by command injection. An attacker may send a request to the `/api/v1/snapshots` endpoint containing any commands to be executed as part of the body of the POST request. This issue may lead to Remote Code Execution (RCE). Versions 5.0.157, 5.0-b1, and 6.0.48 contain a fix.

Nuclei Templates (1)

SRS - Command Injection
HIGHVERIFIEDby iamnoooob,rootxharsh,pdresearch
Shodan: http.favicon.hash:1386054408

Scores

CVSS v3 7.5
EPSS 0.8479
EPSS Percentile 99.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2025-08-17
CWE
CWE-78 CWE-77
Status published
Products (1)
ossrs/simple_realtime_server 5.0.137 - 5.0.157
Published Jun 12, 2023
Tracked Since Feb 18, 2026