Teradek VidiU Pro 3.0.3 contains a server-side request forgery vulnerability in the management interface that allows attackers to manipulate GET parameters 'url' and 'xml_url'. Attackers can exploit this flaw to bypass firewalls, initiate network enumeration, and potentially trigger external HTTP requests to arbitrary destinations.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/44672 | Exploit |
| https://www.teradek.com | Product |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5461.php | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/44672 | Exploit |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5461.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-24 20:15
Updated : 2026-01-26 16:15
NVD link : CVE-2019-25251
Mitre link : CVE-2019-25251
CVE.ORG link : CVE-2019-25251
JSON object : View
Products Affected
teradek
- vidiu_pro
- vidiu_mini
- vidiu_firmware
- vidiu_mini_firmware
- vidiu
- vidiu_pro_firmware
CWE
CWE-918
Server-Side Request Forgery (SSRF)
