CVE-2025-34442: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in World Wide Broadcast Network AVideo
AVideo versions prior to 20.0 disclose absolute filesystem paths via multiple public API endpoints. Returned metadata includes full server paths to media files, revealing underlying filesystem structure and facilitating more effective attack chains.
AI Analysis
Technical Summary
CVE-2025-34442 is a vulnerability identified in the World Wide Broadcast Network's AVideo product, affecting all versions prior to 20.0. The flaw involves the exposure of absolute filesystem paths through multiple public API endpoints. When clients query these APIs, the returned metadata includes full server paths to media files, thereby revealing the underlying directory structure of the server hosting AVideo. This type of information disclosure is classified under CWE-497, which concerns the exposure of sensitive system information to unauthorized entities. The vulnerability is remotely exploitable without authentication or user interaction, making it accessible to any attacker who can reach the API endpoints. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low to medium impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploits have been reported, the disclosure of absolute paths can facilitate attackers in mapping the server environment, identifying potential targets for further attacks such as path traversal, local file inclusion, or privilege escalation. The absence of patch links suggests that remediation requires upgrading to version 20.0 or later, which presumably addresses this issue by sanitizing API responses and removing sensitive path information. Organizations relying on AVideo for media streaming or broadcasting should be aware of this vulnerability due to the potential for attackers to gain insights into server configurations and file locations, which could be leveraged in multi-stage attack chains.
Potential Impact
For European organizations, the exposure of absolute filesystem paths can significantly increase the risk profile of their AVideo deployments. Attackers gaining knowledge of the server's directory structure can craft more precise and effective attacks, such as exploiting path traversal vulnerabilities or targeting specific files for unauthorized access. This can lead to unauthorized data disclosure, service disruption, or even full system compromise if combined with other vulnerabilities. Media companies, broadcasters, educational institutions, and any entities using AVideo to deliver video content are particularly at risk. The impact extends to reputational damage, regulatory non-compliance (especially under GDPR if personal data is involved), and potential financial losses due to service downtime or breach remediation costs. Since the vulnerability requires no authentication and is exploitable remotely, the attack surface is broad, especially for publicly accessible AVideo instances. The medium severity rating reflects the moderate but non-trivial risk posed by this information disclosure, which can be a stepping stone for more severe attacks.
Mitigation Recommendations
1. Upgrade AVideo installations to version 20.0 or later, where this vulnerability is addressed. 2. Restrict access to public API endpoints by implementing network-level controls such as IP whitelisting or VPN access to reduce exposure. 3. Implement web application firewalls (WAFs) to detect and block suspicious API requests that attempt to enumerate or exploit filesystem information. 4. Review and sanitize API responses to ensure that no absolute filesystem paths or sensitive metadata are leaked. 5. Conduct regular security audits and penetration tests focusing on API endpoints to identify and remediate similar information disclosure issues. 6. Monitor logs for unusual access patterns or repeated requests to API endpoints that could indicate reconnaissance activity. 7. Educate development and operations teams about secure coding practices to avoid exposing sensitive system information in responses. 8. If upgrading immediately is not feasible, consider temporary mitigations such as disabling or limiting the affected API endpoints until a patch is applied.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-34442: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in World Wide Broadcast Network AVideo
Description
AVideo versions prior to 20.0 disclose absolute filesystem paths via multiple public API endpoints. Returned metadata includes full server paths to media files, revealing underlying filesystem structure and facilitating more effective attack chains.
AI-Powered Analysis
Technical Analysis
CVE-2025-34442 is a vulnerability identified in the World Wide Broadcast Network's AVideo product, affecting all versions prior to 20.0. The flaw involves the exposure of absolute filesystem paths through multiple public API endpoints. When clients query these APIs, the returned metadata includes full server paths to media files, thereby revealing the underlying directory structure of the server hosting AVideo. This type of information disclosure is classified under CWE-497, which concerns the exposure of sensitive system information to unauthorized entities. The vulnerability is remotely exploitable without authentication or user interaction, making it accessible to any attacker who can reach the API endpoints. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low to medium impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no active exploits have been reported, the disclosure of absolute paths can facilitate attackers in mapping the server environment, identifying potential targets for further attacks such as path traversal, local file inclusion, or privilege escalation. The absence of patch links suggests that remediation requires upgrading to version 20.0 or later, which presumably addresses this issue by sanitizing API responses and removing sensitive path information. Organizations relying on AVideo for media streaming or broadcasting should be aware of this vulnerability due to the potential for attackers to gain insights into server configurations and file locations, which could be leveraged in multi-stage attack chains.
Potential Impact
For European organizations, the exposure of absolute filesystem paths can significantly increase the risk profile of their AVideo deployments. Attackers gaining knowledge of the server's directory structure can craft more precise and effective attacks, such as exploiting path traversal vulnerabilities or targeting specific files for unauthorized access. This can lead to unauthorized data disclosure, service disruption, or even full system compromise if combined with other vulnerabilities. Media companies, broadcasters, educational institutions, and any entities using AVideo to deliver video content are particularly at risk. The impact extends to reputational damage, regulatory non-compliance (especially under GDPR if personal data is involved), and potential financial losses due to service downtime or breach remediation costs. Since the vulnerability requires no authentication and is exploitable remotely, the attack surface is broad, especially for publicly accessible AVideo instances. The medium severity rating reflects the moderate but non-trivial risk posed by this information disclosure, which can be a stepping stone for more severe attacks.
Mitigation Recommendations
1. Upgrade AVideo installations to version 20.0 or later, where this vulnerability is addressed. 2. Restrict access to public API endpoints by implementing network-level controls such as IP whitelisting or VPN access to reduce exposure. 3. Implement web application firewalls (WAFs) to detect and block suspicious API requests that attempt to enumerate or exploit filesystem information. 4. Review and sanitize API responses to ensure that no absolute filesystem paths or sensitive metadata are leaked. 5. Conduct regular security audits and penetration tests focusing on API endpoints to identify and remediate similar information disclosure issues. 6. Monitor logs for unusual access patterns or repeated requests to API endpoints that could indicate reconnaissance activity. 7. Educate development and operations teams about secure coding practices to avoid exposing sensitive system information in responses. 8. If upgrading immediately is not feasible, consider temporary mitigations such as disabling or limiting the affected API endpoints until a patch is applied.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.602Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694309ba0b6f32e62bf653da
Added to database: 12/17/2025, 7:51:22 PM
Last enriched: 12/17/2025, 7:59:13 PM
Last updated: 12/18/2025, 6:15:02 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68459: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Ruijie Networks Co., Ltd. AP180-PE V3.xx
HighCVE-2025-47387: CWE-822 Untrusted Pointer Dereference in Qualcomm, Inc. Snapdragon
HighCVE-2025-47382: CWE-863: Incorrect Authorization in Qualcomm, Inc. Snapdragon
HighCVE-2025-47372: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qualcomm, Inc. Snapdragon
CriticalCVE-2025-47350: CWE-416 Use After Free in Qualcomm, Inc. Snapdragon
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.