Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-33351 — AI Deep Analysis Summary

CVSS 9.1 · Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **What is this vulnerability?** * **Essence:** Server-Side Request Forgery (SSRF) in WWBN AVideo. * **Flaw:** The file `plugin/Live/standAloneFiles/saveDVR.json.php` is vulnerable. * **Consequence:** Unverified …

Q2Root Cause? (CWE/Flaw)

🛡️ **Root Cause? (CWE/Flaw)** * **CWE ID:** CWE-918 (SSRF). * **Technical Flaw:** Lack of input validation on `webSiteRootURL`. * **Mechanism:** User-controlled input is blindly passed to server-side HTTP requests…

Q3Who is affected? (Versions/Components)

👥 **Who is affected? (Versions/Components)** * **Vendor:** WWBN. * **Product:** AVideo (PHP-based video platform). * **Affected Versions:** **Before 26.0**. * **Specific File:** `plugin/Live/standAloneFiles/save…

Q4What can hackers do? (Privileges/Data)

💣 **What can hackers do? (Privileges/Data)** * **Data Access:** Read internal server files or sensitive data (C:H). * **Integrity:** Modify internal server responses or data (I:H). * **Network:** Probe internal ne…

Q5Is exploitation threshold high? (Auth/Config)

🔓 **Is exploitation threshold high? (Auth/Config)** * **Auth Required:** **NO** (PR:N - Privileges Required: None). * **User Interaction:** **NO** (UI:N - User Interaction: None). * **Attack Vector:** Network (AV:…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🧪 **Is there a public Exp? (PoC/Wild Exploitation)** * **PoC Status:** No public PoC listed in data (`pocs: []`). * **References:** GitHub Advisory (GHSA-5f7v-4f6g-74rj) and Commit exist. * **Wild Exploitation:** …

Q7How to self-check? (Features/Scanning)

🔍 **How to self-check? (Features/Scanning)** * **Target URL:** Look for `plugin/Live/standAloneFiles/saveDVR.json.php`. * **Parameter:** Check for `webSiteRootURL` in requests. * **Scanner:** Use SSRF scanners tar…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Is it fixed officially? (Patch/Mitigation)** * **Fix Available:** **YES**. * **Version:** Upgrade to **AVideo 26.0** or later. * **Commit:** Fix committed at `d0c54960389eeb85e76caed5a257ae90e6a739f2`. * **A…

Q9What if no patch? (Workaround)

🚧 **What if no patch? (Workaround)** * **Input Validation:** Manually sanitize `webSiteRootURL` in the vulnerable file. * **Access Control:** Restrict access to `plugin/Live/` directory via WAF/Nginx. * **Network …

Q10Is it urgent? (Priority Suggestion)

⚡ **Is it urgent? (Priority Suggestion)** * **Priority:** **HIGH**. * **Reason:** Remote, unauthenticated, low complexity. * **CVSS Score:** High impact on Confidentiality/Integrity. * **Action:** Patch immediat…