CVE-2026-33483: CWE-770: Allocation of Resources Without Limits or Throttling in WWBN AVideo
CVE-2026-33483 is a high-severity vulnerability in WWBN AVideo versions up to 26. 0, where an unauthenticated attacker can exploit the aVideoEncoderChunk. json. php endpoint to cause disk space exhaustion. This endpoint lacks authentication, resource limits, and cleanup, allowing arbitrary POST data to be written to persistent temp files without size or rate restrictions. The vulnerability leads to denial of service by filling the server's disk space, impacting availability. No user interaction or authentication is required, making exploitation trivial. A patch addressing this issue exists in commit 33d1bae6c731ef1682fcdc47b428313be073a5d1. Organizations using affected versions should apply the patch promptly and implement additional resource controls to mitigate risk.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-33483 affects WWBN AVideo, an open-source video platform, specifically versions up to and including 26.0. The issue resides in the aVideoEncoderChunk.json.php endpoint, which is a standalone PHP script that does not incorporate authentication mechanisms, framework includes, or resource management controls. An unauthenticated remote attacker can send arbitrary POST requests to this endpoint, which writes the data to temporary files in the /tmp/ directory. Critically, there are no limits on the size or rate of these writes, nor is there any cleanup mechanism to remove these files. This design flaw allows an attacker to exhaust the server's disk space by continuously sending large POST payloads, resulting in a denial of service (DoS) condition that can incapacitate the entire server. The vulnerability is classified under CWE-770, which concerns allocation of resources without limits or throttling. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation (no authentication or user interaction required) and the impact on availability. Although no known exploits are reported in the wild, a patch has been committed (commit 33d1bae6c731ef1682fcdc47b428313be073a5d1) to address this issue by presumably adding authentication, resource limits, or cleanup mechanisms.
Potential Impact
The primary impact of CVE-2026-33483 is denial of service through disk space exhaustion, which can disrupt the availability of the AVideo platform and potentially other services running on the same server. Organizations relying on AVideo for video streaming or content delivery may experience service outages, loss of user trust, and operational downtime. The lack of authentication and resource controls means attackers can easily exploit this vulnerability remotely without any credentials or user interaction, increasing the risk of automated attacks and large-scale exploitation. This can lead to significant operational disruption, especially for organizations with high traffic or critical video infrastructure. Additionally, disk exhaustion may cause broader system instability or data loss if the server's storage is shared with other applications or services. Recovery from such an attack may require manual cleanup and system restarts, further increasing downtime and operational costs.
Mitigation Recommendations
Organizations should immediately upgrade to a patched version of WWBN AVideo that includes the fix from commit 33d1bae6c731ef1682fcdc47b428313be073a5d1. Until patching is possible, implement network-level controls such as rate limiting and IP filtering to restrict access to the aVideoEncoderChunk.json.php endpoint. Deploy web application firewalls (WAFs) with custom rules to detect and block abnormal POST request patterns targeting this endpoint. Monitor disk usage closely and set up alerts for unusual growth in the /tmp/ directory. Consider isolating the AVideo service on dedicated infrastructure with limited disk quotas to prevent collateral damage. Review and harden server configurations to restrict file write permissions and implement cleanup scripts to remove stale temporary files regularly. Additionally, conduct regular security audits and penetration testing focused on resource exhaustion vectors to identify similar issues proactively.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-33483: CWE-770: Allocation of Resources Without Limits or Throttling in WWBN AVideo
Description
CVE-2026-33483 is a high-severity vulnerability in WWBN AVideo versions up to 26. 0, where an unauthenticated attacker can exploit the aVideoEncoderChunk. json. php endpoint to cause disk space exhaustion. This endpoint lacks authentication, resource limits, and cleanup, allowing arbitrary POST data to be written to persistent temp files without size or rate restrictions. The vulnerability leads to denial of service by filling the server's disk space, impacting availability. No user interaction or authentication is required, making exploitation trivial. A patch addressing this issue exists in commit 33d1bae6c731ef1682fcdc47b428313be073a5d1. Organizations using affected versions should apply the patch promptly and implement additional resource controls to mitigate risk.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-33483 affects WWBN AVideo, an open-source video platform, specifically versions up to and including 26.0. The issue resides in the aVideoEncoderChunk.json.php endpoint, which is a standalone PHP script that does not incorporate authentication mechanisms, framework includes, or resource management controls. An unauthenticated remote attacker can send arbitrary POST requests to this endpoint, which writes the data to temporary files in the /tmp/ directory. Critically, there are no limits on the size or rate of these writes, nor is there any cleanup mechanism to remove these files. This design flaw allows an attacker to exhaust the server's disk space by continuously sending large POST payloads, resulting in a denial of service (DoS) condition that can incapacitate the entire server. The vulnerability is classified under CWE-770, which concerns allocation of resources without limits or throttling. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation (no authentication or user interaction required) and the impact on availability. Although no known exploits are reported in the wild, a patch has been committed (commit 33d1bae6c731ef1682fcdc47b428313be073a5d1) to address this issue by presumably adding authentication, resource limits, or cleanup mechanisms.
Potential Impact
The primary impact of CVE-2026-33483 is denial of service through disk space exhaustion, which can disrupt the availability of the AVideo platform and potentially other services running on the same server. Organizations relying on AVideo for video streaming or content delivery may experience service outages, loss of user trust, and operational downtime. The lack of authentication and resource controls means attackers can easily exploit this vulnerability remotely without any credentials or user interaction, increasing the risk of automated attacks and large-scale exploitation. This can lead to significant operational disruption, especially for organizations with high traffic or critical video infrastructure. Additionally, disk exhaustion may cause broader system instability or data loss if the server's storage is shared with other applications or services. Recovery from such an attack may require manual cleanup and system restarts, further increasing downtime and operational costs.
Mitigation Recommendations
Organizations should immediately upgrade to a patched version of WWBN AVideo that includes the fix from commit 33d1bae6c731ef1682fcdc47b428313be073a5d1. Until patching is possible, implement network-level controls such as rate limiting and IP filtering to restrict access to the aVideoEncoderChunk.json.php endpoint. Deploy web application firewalls (WAFs) with custom rules to detect and block abnormal POST request patterns targeting this endpoint. Monitor disk usage closely and set up alerts for unusual growth in the /tmp/ directory. Consider isolating the AVideo service on dedicated infrastructure with limited disk quotas to prevent collateral damage. Review and harden server configurations to restrict file write permissions and implement cleanup scripts to remove stale temporary files regularly. Additionally, conduct regular security audits and penetration testing focused on resource exhaustion vectors to identify similar issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-20T16:16:48.970Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c14e9ef4197a8e3b641c92
Added to database: 3/23/2026, 2:30:54 PM
Last enriched: 3/23/2026, 2:46:11 PM
Last updated: 3/23/2026, 3:37:10 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.