CVE-2026-29058
AVideo · Video-sharing Platform
AVideo is vulnerable to unauthenticated command injection via the base64Url parameter. Attackers can execute arbitrary OS commands, leading to full server compromise.
Executive summary
AVideo video-sharing software contains a critical command injection vulnerability that allows unauthenticated attackers to execute OS commands and fully compromise the server.
Vulnerability
This vulnerability is caused by improper sanitization of the base64Url GET parameter. An unauthenticated attacker can inject shell command substitution sequences into this parameter, which are then executed by the server. This provides a direct path to remote code execution.
Business impact
A successful exploit results in total server takeover. Attackers can exfiltrate sensitive configuration files, steal database credentials, and disrupt video services. Given the unauthenticated nature of the attack, any AVideo instance exposed to the internet is at extreme risk of being used for data theft or as part of a botnet. The CVSS score of 9.8 reflects this maximum risk.
Remediation
Immediate Action: Immediately upgrade AVideo to version 7.0 or later. This version contains the necessary patches to sanitize the vulnerable parameter.
Proactive Monitoring: Check web server access logs for suspicious strings or encoded shell commands within the base64Url parameter.
Compensating Controls: Deploy a Web Application Firewall (WAF) to filter for common shell injection patterns (e.g., backticks, $(), or pipe symbols) in GET requests.
Exploitation status
Public Exploit Available: No
Analyst recommendation
This is a "worst-case" vulnerability for a web-facing application. The ability for an unauthenticated user to execute system commands requires immediate remediation. Disable affected AVideo instances until they can be updated to version 7.0 to prevent imminent compromise.