Teradek VidiU Pro 3.0.3 contains a cross-site request forgery vulnerability that allows attackers to change administrative passwords without proper request validation. Attackers can craft malicious web pages that automatically submit password change requests to the device when a logged-in administrator visits the page.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/44671 | Exploit |
| https://www.teradek.com | Product |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5460.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5460.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-24 20:15
Updated : 2026-01-26 16:15
NVD link : CVE-2019-25252
Mitre link : CVE-2019-25252
CVE.ORG link : CVE-2019-25252
JSON object : View
Products Affected
teradek
- vidiu_pro
- vidiu_mini
- vidiu_firmware
- vidiu_mini_firmware
- vidiu
- vidiu_pro_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
