CVE-2026-33483: CWE-770: Allocation of Resources Without Limits or Throttling in WWBN AVideo
CVE-2026-33483 is a high-severity vulnerability in WWBN AVideo versions up to 26. 0 involving an unauthenticated PHP endpoint that allows remote attackers to write unlimited data to temporary files without size or rate limits. This flaw enables trivial disk space exhaustion, resulting in denial of service (DoS) of the entire server hosting the video platform. The vulnerable endpoint, aVideoEncoderChunk. json. php, lacks authentication, framework protections, and cleanup mechanisms, making exploitation straightforward. No user interaction or privileges are required, and the attack surface is fully remote. A patch addressing this issue is available in commit 33d1bae6c731ef1682fcdc47b428313be073a5d1. Organizations using affected versions should prioritize applying the patch to prevent service disruption. The vulnerability impacts confidentiality and integrity minimally but severely affects availability.
AI Analysis
Technical Summary
CVE-2026-33483 is a resource exhaustion vulnerability classified under CWE-770 affecting WWBN AVideo, an open-source video platform. The vulnerability exists in the aVideoEncoderChunk.json.php endpoint, which is a standalone PHP script present in versions up to and including 26.0. This script does not implement any authentication or authorization checks, nor does it include framework protections or resource management controls. An unauthenticated remote attacker can send arbitrary POST requests containing data that the script writes directly to persistent temporary files in the /tmp/ directory. Critically, there are no limits on the size or rate of data that can be written, and no cleanup mechanism to remove these files after use. This allows an attacker to rapidly exhaust disk space on the server, causing denial of service by preventing normal operation of the platform and potentially affecting other services on the host. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its high severity due to ease of exploitation (no privileges or user interaction required) and significant impact on availability. Although no known exploits are reported in the wild yet, the simplicity of the attack vector makes it a likely target for attackers seeking to disrupt services. A patch has been committed to address this issue by introducing authentication and resource limits, and users are strongly advised to upgrade to versions beyond 26.0 or apply the patch manually.
Potential Impact
The primary impact of CVE-2026-33483 is denial of service through disk space exhaustion. Organizations running vulnerable versions of WWBN AVideo risk complete service disruption of their video streaming platforms, which can affect user experience, business continuity, and reputation. The attack can also impact other applications sharing the same server or storage resources, potentially causing broader operational outages. Since the vulnerability requires no authentication or user interaction, it can be exploited by any remote attacker, increasing the risk of automated attacks and large-scale disruptions. For organizations relying on AVideo for critical communications, media delivery, or educational content, this vulnerability could lead to significant downtime and financial losses. Additionally, recovery from disk exhaustion may require manual intervention, including cleanup and potential server reboots, increasing operational overhead. While confidentiality and integrity are not directly compromised, the availability impact alone justifies urgent remediation.
Mitigation Recommendations
To mitigate CVE-2026-33483, organizations should immediately upgrade WWBN AVideo to a version later than 26.0 that includes the patch from commit 33d1bae6c731ef1682fcdc47b428313be073a5d1. If upgrading is not immediately possible, administrators should implement temporary controls such as: 1) Restricting access to the aVideoEncoderChunk.json.php endpoint via network-level controls (firewalls, IP whitelisting) to trusted sources only. 2) Implementing web application firewall (WAF) rules to detect and block abnormal POST request sizes or rates targeting this endpoint. 3) Monitoring disk usage on servers hosting AVideo closely and setting alerts for unusual growth in /tmp/ directory files. 4) Applying OS-level quotas or limits on /tmp/ directory usage per process or user to prevent total disk exhaustion. 5) Regularly cleaning up temporary files manually or via automated scripts until the patch is applied. Additionally, reviewing server and application logs for suspicious POST requests to this endpoint can help detect exploitation attempts early. Finally, organizations should incorporate this vulnerability into their incident response plans and ensure backups and recovery procedures are tested to minimize downtime in case of an attack.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, South Korea, India, Brazil
CVE-2026-33483: CWE-770: Allocation of Resources Without Limits or Throttling in WWBN AVideo
Description
CVE-2026-33483 is a high-severity vulnerability in WWBN AVideo versions up to 26. 0 involving an unauthenticated PHP endpoint that allows remote attackers to write unlimited data to temporary files without size or rate limits. This flaw enables trivial disk space exhaustion, resulting in denial of service (DoS) of the entire server hosting the video platform. The vulnerable endpoint, aVideoEncoderChunk. json. php, lacks authentication, framework protections, and cleanup mechanisms, making exploitation straightforward. No user interaction or privileges are required, and the attack surface is fully remote. A patch addressing this issue is available in commit 33d1bae6c731ef1682fcdc47b428313be073a5d1. Organizations using affected versions should prioritize applying the patch to prevent service disruption. The vulnerability impacts confidentiality and integrity minimally but severely affects availability.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33483 is a resource exhaustion vulnerability classified under CWE-770 affecting WWBN AVideo, an open-source video platform. The vulnerability exists in the aVideoEncoderChunk.json.php endpoint, which is a standalone PHP script present in versions up to and including 26.0. This script does not implement any authentication or authorization checks, nor does it include framework protections or resource management controls. An unauthenticated remote attacker can send arbitrary POST requests containing data that the script writes directly to persistent temporary files in the /tmp/ directory. Critically, there are no limits on the size or rate of data that can be written, and no cleanup mechanism to remove these files after use. This allows an attacker to rapidly exhaust disk space on the server, causing denial of service by preventing normal operation of the platform and potentially affecting other services on the host. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its high severity due to ease of exploitation (no privileges or user interaction required) and significant impact on availability. Although no known exploits are reported in the wild yet, the simplicity of the attack vector makes it a likely target for attackers seeking to disrupt services. A patch has been committed to address this issue by introducing authentication and resource limits, and users are strongly advised to upgrade to versions beyond 26.0 or apply the patch manually.
Potential Impact
The primary impact of CVE-2026-33483 is denial of service through disk space exhaustion. Organizations running vulnerable versions of WWBN AVideo risk complete service disruption of their video streaming platforms, which can affect user experience, business continuity, and reputation. The attack can also impact other applications sharing the same server or storage resources, potentially causing broader operational outages. Since the vulnerability requires no authentication or user interaction, it can be exploited by any remote attacker, increasing the risk of automated attacks and large-scale disruptions. For organizations relying on AVideo for critical communications, media delivery, or educational content, this vulnerability could lead to significant downtime and financial losses. Additionally, recovery from disk exhaustion may require manual intervention, including cleanup and potential server reboots, increasing operational overhead. While confidentiality and integrity are not directly compromised, the availability impact alone justifies urgent remediation.
Mitigation Recommendations
To mitigate CVE-2026-33483, organizations should immediately upgrade WWBN AVideo to a version later than 26.0 that includes the patch from commit 33d1bae6c731ef1682fcdc47b428313be073a5d1. If upgrading is not immediately possible, administrators should implement temporary controls such as: 1) Restricting access to the aVideoEncoderChunk.json.php endpoint via network-level controls (firewalls, IP whitelisting) to trusted sources only. 2) Implementing web application firewall (WAF) rules to detect and block abnormal POST request sizes or rates targeting this endpoint. 3) Monitoring disk usage on servers hosting AVideo closely and setting alerts for unusual growth in /tmp/ directory files. 4) Applying OS-level quotas or limits on /tmp/ directory usage per process or user to prevent total disk exhaustion. 5) Regularly cleaning up temporary files manually or via automated scripts until the patch is applied. Additionally, reviewing server and application logs for suspicious POST requests to this endpoint can help detect exploitation attempts early. Finally, organizations should incorporate this vulnerability into their incident response plans and ensure backups and recovery procedures are tested to minimize downtime in case of an attack.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-20T16:16:48.970Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c14e9ef4197a8e3b641c92
Added to database: 3/23/2026, 2:30:54 PM
Last enriched: 3/30/2026, 8:31:23 PM
Last updated: 5/7/2026, 4:29:56 AM
Views: 110
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.