Vulnerability Description
Teradek VidiU Pro 3.0.3 contains a server-side request forgery vulnerability in the management interface that allows attackers to manipulate GET parameters 'url' and 'xml_url'. Attackers can exploit this flaw to bypass firewalls, initiate network enumeration, and potentially trigger external HTTP requests to arbitrary destinations.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Teradek | Vidiu Pro Firmware | 2.4.10 |
| Teradek | Vidiu Pro | - |
| Teradek | Vidiu Firmware | 2.4.10 |
| Teradek | Vidiu | - |
| Teradek | Vidiu Mini Firmware | 2.4.10 |
| Teradek | Vidiu Mini | - |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/44672Exploit
- https://www.teradek.comProduct
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5461.phpExploitThird Party Advisory
- https://www.exploit-db.com/exploits/44672Exploit
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5461.phpExploitThird Party Advisory
FAQ
What is CVE-2019-25251?
CVE-2019-25251 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Teradek VidiU Pro 3.0.3 contains a server-side request forgery vulnerability in the management interface that allows attackers to manipulate GET parameters 'url' and 'xml_url'. Attackers can exploit t...
How severe is CVE-2019-25251?
CVE-2019-25251 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25251?
Check the references section above for vendor advisories and patch information. Affected products include: Teradek Vidiu Pro Firmware, Teradek Vidiu Pro, Teradek Vidiu Firmware, Teradek Vidiu, Teradek Vidiu Mini Firmware.