Vulnerability Description
An unauthenticated command injection vulnerability exists in Serviio Media Server versions 1.4 through 1.8 on Windows, in the /rest/action API endpoint exposed by the console component (default port 23423). The checkStreamUrl method accepts a VIDEO parameter that is passed unsanitized to a call to cmd.exe, enabling arbitrary command execution under the privileges of the web server. No authentication is required to exploit this issue, as the REST API is exposed by default and lacks access controls.
Related Weaknesses (CWE)
References
- https://fortiguard.fortinet.com/encyclopedia/ips/44042
- https://packetstorm.news/files/id/142387
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://vulncheck.com/advisories/serviio-media-server-unauthenticated-command-in
- https://www.exploit-db.com/exploits/42023
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5408.php
FAQ
What is CVE-2025-34101?
CVE-2025-34101 is a documented vulnerability. An unauthenticated command injection vulnerability exists in Serviio Media Server versions 1.4 through 1.8 on Windows, in the /rest/action API endpoint exposed by the console component (default port 2...
How severe is CVE-2025-34101?
CVSS scoring is not yet available for CVE-2025-34101. Check NVD for updates.
Is there a patch for CVE-2025-34101?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.