An unauthenticated command injection vulnerability exists in Serviio Media Server versions 1.4 through 1.8 on Windows, in the /rest/action API endpoint exposed by the console component (default port 23423). The checkStreamUrl method accepts a VIDEO parameter that is passed unsanitized to a call to cmd.exe, enabling arbitrary command execution under the privileges of the web server. No authentication is required to exploit this issue, as the REST API is exposed by default and lacks access controls.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Thu, 10 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 10 Jul 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated command injection vulnerability exists in Serviio Media Server versions 1.4 through 1.8 on Windows, in the /rest/action API endpoint exposed by the console component (default port 23423). The checkStreamUrl method accepts a VIDEO parameter that is passed unsanitized to a call to cmd.exe, enabling arbitrary command execution under the privileges of the web server. No authentication is required to exploit this issue, as the REST API is exposed by default and lacks access controls. | |
Title | Serviio Media Server Unauthenticated Command Injection via checkStreamUrl VIDEO Parameter | |
Weaknesses | CWE-20 CWE-306 CWE-78 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-10T19:11:05.353Z
Updated: 2025-07-10T20:25:09.207Z
Reserved: 2025-04-15T19:15:22.556Z
Link: CVE-2025-34101

Updated: 2025-07-10T20:25:05.488Z

Status : Awaiting Analysis
Published: 2025-07-10T20:15:25.877
Modified: 2025-07-15T13:14:49.980
Link: CVE-2025-34101

No data.