This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: CVE-2026-33716 is an **Authorization Bypass** in WWBN AVideo. <br>π₯ **Consequences**: Attackers can manipulate the `streamerURL` parameter in `control.json.php`.β¦
β‘ **Threshold**: **LOW**. <br>π **Auth**: None required (**PR:N**). <br>π **Network**: Network accessible (**AV:N**). <br>π€ **UI**: No user interaction needed (**UI:N**).
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exploit**: **No**. <br>π« **PoCs**: The `pocs` array is empty in the data. <br>β οΈ **Status**: Theoretical risk, but CVSS indicates high severity.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: <br>1. Scan for `control.json.php` endpoint. <br>2. Check AVideo version (β€ 26.0). <br>3. Look for unauthenticated access to streamer URL parameters.
π‘οΈ **No Patch Workaround**: <br>1. **Block Access**: Restrict access to `standAloneFiles/` directory via WAF/Nginx. <br>2. **Disable**: If not used, disable live streaming features. <br>3.β¦