CVE-2025-34433

CRITICAL

AVideo <20.1 - RCE

Title source: llm

Description

AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code execution vulnerability caused by predictable generation of an installation salt using PHP uniqid(). The installation timestamp is exposed via a public endpoint, and a derived hash identifier is accessible through unauthenticated API responses, allowing attackers to brute-force the remaining entropy. The recovered salt can then be used to encrypt a malicious payload supplied to a notification API endpoint that evaluates attacker-controlled input, resulting in arbitrary code execution as the web server user.

Exploits (1)

metasploit WORKING POC EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/avideo_notify_ffmpeg_unauth_rce.rb

Scores

CVSS v4 9.3
EPSS 0.5168
EPSS Percentile 97.9%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Details

CWE
CWE-94
Status published
Products (1)
World Wide Broadcast Network/AVideo 14.3.1 - 20.1
Published Dec 19, 2025
Tracked Since Feb 18, 2026