Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33648: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in WWBN AVideo

0
High
VulnerabilityCVE-2026-33648cvecve-2026-33648cwe-78
Published: Mon Mar 23 2026 (03/23/2026, 18:25:07 UTC)
Source: CVE Database V5
Vendor/Project: WWBN
Product: AVideo

Description

CVE-2026-33648 is a high-severity OS command injection vulnerability in WWBN AVideo versions up to 26. 0. The flaw exists in the restreamer endpoint, which unsafely incorporates user-controlled JSON parameters into shell commands without sanitization. Authenticated users can exploit this by injecting shell metacharacters to execute arbitrary commands on the server. This vulnerability impacts confidentiality, integrity, and availability, as attackers can run malicious code remotely. A patch addressing this issue has been committed but not yet widely distributed. Organizations using affected versions should urgently apply the fix or implement strict input validation. The vulnerability requires authentication but no user interaction beyond sending crafted requests. Countries with significant WWBN AVideo deployments and active video streaming services are at higher risk. Due to the ease of exploitation and broad impact, this vulnerability is rated high severity with a CVSS score of 8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 19:01:38 UTC

Technical Analysis

CVE-2026-33648 is an OS command injection vulnerability identified in the WWBN AVideo open source video platform, affecting all versions up to and including 26.0. The vulnerability arises from the restreamer endpoint's unsafe handling of user input: specifically, the 'users_id' and 'liveTransmitionHistory_id' fields extracted from the JSON request body are embedded directly into a log file path string without any sanitization or validation. This constructed path is then concatenated into shell commands executed via PHP's exec() function. Because the input is not neutralized, an authenticated attacker can inject shell metacharacters such as $() or backticks to execute arbitrary commands on the underlying server operating system. This can lead to full system compromise, data theft, or service disruption. The vulnerability requires the attacker to be authenticated but does not require additional user interaction. The issue is tracked under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). A patch has been committed (commit 99b865413172045fef6a98b5e9bfc7b24da11678) that properly sanitizes inputs to prevent command injection. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and privileges required.

Potential Impact

The impact of CVE-2026-33648 is significant for organizations using WWBN AVideo versions up to 26.0. Successful exploitation allows authenticated attackers to execute arbitrary OS commands, potentially leading to full server compromise. This can result in unauthorized data access or exfiltration, modification or deletion of critical data, disruption of video streaming services, and potential lateral movement within the network. Given that AVideo is a video platform, attackers could also manipulate or disrupt media content delivery, damaging organizational reputation and causing operational downtime. The vulnerability affects confidentiality, integrity, and availability simultaneously, making it a critical risk for service providers, media companies, educational institutions, and any organization relying on AVideo for video streaming. The requirement for authentication limits exposure somewhat, but insider threats or compromised credentials increase risk. No known exploits are currently reported in the wild, but the straightforward exploitation method suggests attackers may develop exploits rapidly.

Mitigation Recommendations

To mitigate CVE-2026-33648, organizations should immediately upgrade WWBN AVideo to a version that includes the patch from commit 99b865413172045fef6a98b5e9bfc7b24da11678 or later. If upgrading is not immediately possible, implement strict input validation and sanitization on the 'users_id' and 'liveTransmitionHistory_id' parameters at the application or web server level to block shell metacharacters and command injection patterns. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the restreamer endpoint. Restrict access to the restreamer endpoint to trusted users and networks, and enforce strong authentication and credential management to reduce the risk of compromised accounts. Monitor logs for unusual command execution patterns or anomalies in the restreamer service. Conduct regular security audits and penetration testing focusing on injection vulnerabilities. Finally, educate developers on secure coding practices to avoid direct concatenation of user input into shell commands.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T15:23:42.217Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c18a60f4197a8e3b8159ef

Added to database: 3/23/2026, 6:45:52 PM

Last enriched: 3/23/2026, 7:01:38 PM

Last updated: 3/23/2026, 7:50:29 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses