Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33483: CWE-770: Allocation of Resources Without Limits or Throttling in WWBN AVideo

0
High
VulnerabilityCVE-2026-33483cvecve-2026-33483cwe-770
Published: Mon Mar 23 2026 (03/23/2026, 14:12:05 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33483 is a high-severity vulnerability in WWBN AVideo versions up to 26. 0, where an unauthenticated attacker can exploit the aVideoEncoderChunk. json. php endpoint to cause disk space exhaustion. This endpoint lacks authentication, resource limits, and cleanup, allowing arbitrary POST data to be written to persistent temp files without size or rate restrictions. The vulnerability leads to denial of service by filling the server's disk space, impacting availability. No user interaction or authentication is required, making exploitation trivial. A patch addressing this issue exists in commit 33d1bae6c731ef1682fcdc47b428313be073a5d1. Organizations using affected versions should apply the patch promptly and implement additional resource controls to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 14:46:11 UTC

Technical Analysis

The vulnerability identified as CVE-2026-33483 affects WWBN AVideo, an open-source video platform, specifically versions up to and including 26.0. The issue resides in the aVideoEncoderChunk.json.php endpoint, which is a standalone PHP script that does not incorporate authentication mechanisms, framework includes, or resource management controls. An unauthenticated remote attacker can send arbitrary POST requests to this endpoint, which writes the data to temporary files in the /tmp/ directory. Critically, there are no limits on the size or rate of these writes, nor is there any cleanup mechanism to remove these files. This design flaw allows an attacker to exhaust the server's disk space by continuously sending large POST payloads, resulting in a denial of service (DoS) condition that can incapacitate the entire server. The vulnerability is classified under CWE-770, which concerns allocation of resources without limits or throttling. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation (no authentication or user interaction required) and the impact on availability. Although no known exploits are reported in the wild, a patch has been committed (commit 33d1bae6c731ef1682fcdc47b428313be073a5d1) to address this issue by presumably adding authentication, resource limits, or cleanup mechanisms.

Potential Impact

The primary impact of CVE-2026-33483 is denial of service through disk space exhaustion, which can disrupt the availability of the AVideo platform and potentially other services running on the same server. Organizations relying on AVideo for video streaming or content delivery may experience service outages, loss of user trust, and operational downtime. The lack of authentication and resource controls means attackers can easily exploit this vulnerability remotely without any credentials or user interaction, increasing the risk of automated attacks and large-scale exploitation. This can lead to significant operational disruption, especially for organizations with high traffic or critical video infrastructure. Additionally, disk exhaustion may cause broader system instability or data loss if the server's storage is shared with other applications or services. Recovery from such an attack may require manual cleanup and system restarts, further increasing downtime and operational costs.

Mitigation Recommendations

Organizations should immediately upgrade to a patched version of WWBN AVideo that includes the fix from commit 33d1bae6c731ef1682fcdc47b428313be073a5d1. Until patching is possible, implement network-level controls such as rate limiting and IP filtering to restrict access to the aVideoEncoderChunk.json.php endpoint. Deploy web application firewalls (WAFs) with custom rules to detect and block abnormal POST request patterns targeting this endpoint. Monitor disk usage closely and set up alerts for unusual growth in the /tmp/ directory. Consider isolating the AVideo service on dedicated infrastructure with limited disk quotas to prevent collateral damage. Review and harden server configurations to restrict file write permissions and implement cleanup scripts to remove stale temporary files regularly. Additionally, conduct regular security audits and penetration testing focused on resource exhaustion vectors to identify similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:16:48.970Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c14e9ef4197a8e3b641c92

Added to database: 3/23/2026, 2:30:54 PM

Last enriched: 3/23/2026, 2:46:11 PM

Last updated: 3/23/2026, 3:37:10 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses