Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3966: Server-Side Request Forgery in 648540858 wvp-GB28181-pro

0
Medium
VulnerabilityCVE-2026-3966cvecve-2026-3966
Published: Thu Mar 12 2026 (03/12/2026, 00:02:08 UTC)
Source: CVE Database V5
Vendor/Project: 648540858
Product: wvp-GB28181-pro

Description

CVE-2026-3966 is a server-side request forgery (SSRF) vulnerability in the wvp-GB28181-pro product version up to 2. 7. 4-20260107. The flaw exists in the getDownloadFilePath function within the IP Address Handler component, specifically in the handling of the MediaServer. streamIp argument. An attacker can remotely manipulate this argument to cause the server to make unauthorized requests to internal or external systems. The vulnerability requires no user interaction and no authentication, increasing its risk. Although the vendor was notified, no patch or response has been provided yet. The CVSS 4. 0 score is 5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:33:43 UTC

Technical Analysis

CVE-2026-3966 identifies a server-side request forgery vulnerability in the wvp-GB28181-pro software, specifically affecting versions up to 2.7.4-20260107. The vulnerability resides in the getDownloadFilePath function of the IP Address Handler component, located in the source file ABLMediaNodeServerService.java. The issue arises from improper validation or sanitization of the MediaServer.streamIp parameter, which an attacker can manipulate remotely to coerce the server into making arbitrary HTTP requests. This SSRF flaw can be exploited without authentication or user interaction, allowing attackers to potentially access internal network resources, bypass firewall restrictions, or interact with sensitive backend services. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to its network attack vector, low complexity, and no required privileges. The vendor was informed early but has not issued a patch or mitigation guidance, and public exploit code is available, increasing the risk of exploitation. The vulnerability does not directly cause denial of service but can facilitate further attacks such as data exfiltration or lateral movement within the victim's network.

Potential Impact

The SSRF vulnerability in wvp-GB28181-pro can have significant impacts on organizations using this software, especially those deploying it in sensitive or critical environments. Attackers exploiting this flaw can make the vulnerable server send crafted requests to internal systems that are otherwise inaccessible externally, potentially exposing internal services, metadata endpoints, or administrative interfaces. This can lead to unauthorized information disclosure, including sensitive configuration or credential data. Additionally, SSRF can be leveraged as a pivot point for further attacks such as remote code execution, lateral movement, or network reconnaissance. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by unauthenticated attackers, increasing the attack surface. The lack of vendor response and patch availability further elevates the risk, as organizations remain exposed. The medium CVSS score reflects moderate impact, but the actual damage depends on the internal network architecture and the sensitivity of accessible resources. Overall, this vulnerability poses a moderate to high risk to confidentiality and integrity within affected environments.

Mitigation Recommendations

Given the absence of an official patch, organizations should implement several specific mitigations to reduce risk. First, restrict network access to the wvp-GB28181-pro server, limiting exposure to trusted IP addresses and minimizing public accessibility. Employ network segmentation and firewall rules to prevent the server from initiating requests to sensitive internal services or metadata endpoints. Implement strict input validation and sanitization at the application or proxy level to detect and block malicious MediaServer.streamIp parameter values. Use web application firewalls (WAFs) with custom rules to identify and block SSRF attack patterns targeting this parameter. Monitor logs for unusual outbound requests originating from the server, which may indicate exploitation attempts. If feasible, deploy runtime application self-protection (RASP) solutions to detect and prevent SSRF behavior dynamically. Organizations should also engage with the vendor for updates and consider temporary compensating controls such as disabling or restricting the vulnerable functionality until a patch is available. Finally, conduct internal security assessments to identify and secure any internal services that could be targeted via SSRF.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-11T13:31:34.186Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b205772f860ef9439c949e

Added to database: 3/12/2026, 12:14:47 AM

Last enriched: 3/19/2026, 2:33:43 AM

Last updated: 4/24/2026, 10:16:57 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses