CVE-2026-3966: Server-Side Request Forgery in 648540858 wvp-GB28181-pro
CVE-2026-3966 is a server-side request forgery (SSRF) vulnerability in the wvp-GB28181-pro product version up to 2. 7. 4-20260107. The flaw exists in the getDownloadFilePath function within the IP Address Handler component, specifically in the handling of the MediaServer. streamIp argument. An attacker can remotely manipulate this argument to cause the server to make unauthorized requests to internal or external systems. The vulnerability requires no user interaction and no authentication, increasing its risk. Although the vendor was notified, no patch or response has been provided yet. The CVSS 4. 0 score is 5.
AI Analysis
Technical Summary
CVE-2026-3966 identifies a server-side request forgery vulnerability in the wvp-GB28181-pro software, specifically affecting versions up to 2.7.4-20260107. The vulnerability resides in the getDownloadFilePath function of the IP Address Handler component, located in the source file ABLMediaNodeServerService.java. The issue arises from improper validation or sanitization of the MediaServer.streamIp parameter, which an attacker can manipulate remotely to coerce the server into making arbitrary HTTP requests. This SSRF flaw can be exploited without authentication or user interaction, allowing attackers to potentially access internal network resources, bypass firewall restrictions, or interact with sensitive backend services. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to its network attack vector, low complexity, and no required privileges. The vendor was informed early but has not issued a patch or mitigation guidance, and public exploit code is available, increasing the risk of exploitation. The vulnerability does not directly cause denial of service but can facilitate further attacks such as data exfiltration or lateral movement within the victim's network.
Potential Impact
The SSRF vulnerability in wvp-GB28181-pro can have significant impacts on organizations using this software, especially those deploying it in sensitive or critical environments. Attackers exploiting this flaw can make the vulnerable server send crafted requests to internal systems that are otherwise inaccessible externally, potentially exposing internal services, metadata endpoints, or administrative interfaces. This can lead to unauthorized information disclosure, including sensitive configuration or credential data. Additionally, SSRF can be leveraged as a pivot point for further attacks such as remote code execution, lateral movement, or network reconnaissance. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by unauthenticated attackers, increasing the attack surface. The lack of vendor response and patch availability further elevates the risk, as organizations remain exposed. The medium CVSS score reflects moderate impact, but the actual damage depends on the internal network architecture and the sensitivity of accessible resources. Overall, this vulnerability poses a moderate to high risk to confidentiality and integrity within affected environments.
Mitigation Recommendations
Given the absence of an official patch, organizations should implement several specific mitigations to reduce risk. First, restrict network access to the wvp-GB28181-pro server, limiting exposure to trusted IP addresses and minimizing public accessibility. Employ network segmentation and firewall rules to prevent the server from initiating requests to sensitive internal services or metadata endpoints. Implement strict input validation and sanitization at the application or proxy level to detect and block malicious MediaServer.streamIp parameter values. Use web application firewalls (WAFs) with custom rules to identify and block SSRF attack patterns targeting this parameter. Monitor logs for unusual outbound requests originating from the server, which may indicate exploitation attempts. If feasible, deploy runtime application self-protection (RASP) solutions to detect and prevent SSRF behavior dynamically. Organizations should also engage with the vendor for updates and consider temporary compensating controls such as disabling or restricting the vulnerable functionality until a patch is available. Finally, conduct internal security assessments to identify and secure any internal services that could be targeted via SSRF.
Affected Countries
China, United States, Germany, South Korea, Japan, India, Russia, United Kingdom, France, Brazil
CVE-2026-3966: Server-Side Request Forgery in 648540858 wvp-GB28181-pro
Description
CVE-2026-3966 is a server-side request forgery (SSRF) vulnerability in the wvp-GB28181-pro product version up to 2. 7. 4-20260107. The flaw exists in the getDownloadFilePath function within the IP Address Handler component, specifically in the handling of the MediaServer. streamIp argument. An attacker can remotely manipulate this argument to cause the server to make unauthorized requests to internal or external systems. The vulnerability requires no user interaction and no authentication, increasing its risk. Although the vendor was notified, no patch or response has been provided yet. The CVSS 4. 0 score is 5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-3966 identifies a server-side request forgery vulnerability in the wvp-GB28181-pro software, specifically affecting versions up to 2.7.4-20260107. The vulnerability resides in the getDownloadFilePath function of the IP Address Handler component, located in the source file ABLMediaNodeServerService.java. The issue arises from improper validation or sanitization of the MediaServer.streamIp parameter, which an attacker can manipulate remotely to coerce the server into making arbitrary HTTP requests. This SSRF flaw can be exploited without authentication or user interaction, allowing attackers to potentially access internal network resources, bypass firewall restrictions, or interact with sensitive backend services. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting medium severity due to its network attack vector, low complexity, and no required privileges. The vendor was informed early but has not issued a patch or mitigation guidance, and public exploit code is available, increasing the risk of exploitation. The vulnerability does not directly cause denial of service but can facilitate further attacks such as data exfiltration or lateral movement within the victim's network.
Potential Impact
The SSRF vulnerability in wvp-GB28181-pro can have significant impacts on organizations using this software, especially those deploying it in sensitive or critical environments. Attackers exploiting this flaw can make the vulnerable server send crafted requests to internal systems that are otherwise inaccessible externally, potentially exposing internal services, metadata endpoints, or administrative interfaces. This can lead to unauthorized information disclosure, including sensitive configuration or credential data. Additionally, SSRF can be leveraged as a pivot point for further attacks such as remote code execution, lateral movement, or network reconnaissance. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by unauthenticated attackers, increasing the attack surface. The lack of vendor response and patch availability further elevates the risk, as organizations remain exposed. The medium CVSS score reflects moderate impact, but the actual damage depends on the internal network architecture and the sensitivity of accessible resources. Overall, this vulnerability poses a moderate to high risk to confidentiality and integrity within affected environments.
Mitigation Recommendations
Given the absence of an official patch, organizations should implement several specific mitigations to reduce risk. First, restrict network access to the wvp-GB28181-pro server, limiting exposure to trusted IP addresses and minimizing public accessibility. Employ network segmentation and firewall rules to prevent the server from initiating requests to sensitive internal services or metadata endpoints. Implement strict input validation and sanitization at the application or proxy level to detect and block malicious MediaServer.streamIp parameter values. Use web application firewalls (WAFs) with custom rules to identify and block SSRF attack patterns targeting this parameter. Monitor logs for unusual outbound requests originating from the server, which may indicate exploitation attempts. If feasible, deploy runtime application self-protection (RASP) solutions to detect and prevent SSRF behavior dynamically. Organizations should also engage with the vendor for updates and consider temporary compensating controls such as disabling or restricting the vulnerable functionality until a patch is available. Finally, conduct internal security assessments to identify and secure any internal services that could be targeted via SSRF.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-11T13:31:34.186Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b205772f860ef9439c949e
Added to database: 3/12/2026, 12:14:47 AM
Last enriched: 3/19/2026, 2:33:43 AM
Last updated: 4/24/2026, 10:16:57 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.