Skip to main content

CVE-2025-57799: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in lemon8866 StreamVault

High
VulnerabilityCVE-2025-57799cvecve-2025-57799cwe-78
Published: Mon Sep 01 2025 (09/01/2025, 15:46:27 UTC)
Source: CVE Database V5
Vendor/Project: lemon8866
Product: StreamVault

Description

StreamVault is a multi-platform video parsing and downloading tool. Prior to version 250822, after logging into the StreamVault-system, an attacker can modify certain system parameters, construct malicious commands, execute command injection attacks against the system, and ultimately gain server privileges. Users of all versions of the StreamVault system to date who have not modified their background passwords or use weak passwords are at risk of having their systems taken over via remote command execution. This issue has been patched in version 250822.

AI-Powered Analysis

AILast updated: 09/01/2025, 16:17:43 UTC

Technical Analysis

CVE-2025-57799 is a high-severity OS command injection vulnerability (CWE-78) affecting lemon8866's StreamVault, a multi-platform video parsing and downloading tool. The vulnerability exists in versions prior to 250822. After authenticating to the StreamVault system, an attacker with at least limited privileges can modify certain system parameters that are improperly sanitized, allowing them to inject and execute arbitrary operating system commands. This leads to remote command execution on the server hosting StreamVault, potentially resulting in full server compromise and privilege escalation. The vulnerability does not require user interaction beyond logging in, and no additional authentication bypass is needed beyond valid credentials. The CVSS 4.0 score is 8.7 (high), reflecting the network attack vector, low attack complexity, no privileges required beyond login, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability has been patched in version 250822. However, systems running older versions with default or weak passwords remain at risk. No known exploits are currently reported in the wild, but the ease of exploitation and impact make this a critical concern for affected users.

Potential Impact

For European organizations using StreamVault, this vulnerability poses a significant risk. Successful exploitation can lead to full server compromise, allowing attackers to access sensitive video data, manipulate or delete content, disrupt services, or use the compromised server as a foothold for lateral movement within the network. Given StreamVault's role in video parsing and downloading, organizations in media, surveillance, broadcasting, or content delivery sectors are particularly vulnerable. The compromise of video data can lead to confidentiality breaches, intellectual property theft, and reputational damage. Additionally, attackers gaining server privileges could disrupt critical operations or launch further attacks. The risk is heightened if organizations have not updated to the patched version or maintain weak authentication practices. The lack of required user interaction and network accessibility of the service increases the likelihood of remote exploitation.

Mitigation Recommendations

European organizations should immediately verify their StreamVault version and upgrade to version 250822 or later to apply the official patch. Until patched, restrict access to the StreamVault management interface via network segmentation and firewall rules to trusted administrators only. Enforce strong, unique passwords and consider implementing multi-factor authentication if supported. Monitor logs for unusual parameter changes or command execution attempts. Employ application-layer firewalls or intrusion detection systems capable of detecting command injection patterns. Regularly audit and harden server configurations hosting StreamVault to minimize attack surface. Additionally, conduct internal penetration testing to verify the absence of exploitation and ensure that no unauthorized commands have been executed. Maintain an incident response plan tailored to potential server compromises involving StreamVault.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-20T14:30:35.009Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b5c3a1ad5a09ad00d0bec1

Added to database: 9/1/2025, 4:02:41 PM

Last enriched: 9/1/2025, 4:17:43 PM

Last updated: 9/3/2025, 5:29:54 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats