CVE-2025-34433
CRITICALAVideo <20.1 - RCE
Title source: llmDescription
AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code execution vulnerability caused by predictable generation of an installation salt using PHP uniqid(). The installation timestamp is exposed via a public endpoint, and a derived hash identifier is accessible through unauthenticated API responses, allowing attackers to brute-force the remaining entropy. The recovered salt can then be used to encrypt a malicious payload supplied to a notification API endpoint that evaluates attacker-controlled input, resulting in arbitrary code execution as the web server user.
Exploits (1)
metasploit
WORKING POC
EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/avideo_notify_ffmpeg_unauth_rce.rb
References (4)
Scores
CVSS v4
9.3
EPSS
0.5168
EPSS Percentile
97.9%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Details
CWE
CWE-94
Status
published
Products (1)
World Wide Broadcast Network/AVideo
14.3.1 - 20.1
Published
Dec 19, 2025
Tracked Since
Feb 18, 2026