CVE-2026-33292 - Vulnerability Analysis
HighCVSS: 7.5Last Updated: March 23, 2026
WWBN AVideo - Path Traversal
Overview
WWBN AVideo < 26.0 contains a path traversal caused by inconsistent handling of the videoDirectory parameter in view/hls.php, letting unauthenticated attackers stream unauthorized private or paid videos, exploit requires crafted request.
Severity & Score
Impact
Unauthenticated attackers can stream any private or paid video, bypassing authorization controls.
Mitigation
Update to version 26.0 or later.
References
Social Media Activity(2 posts)
š CVE-2026-33292 - High (7.5) WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. ... š https://www.thehackerwire.com/vulnerability/CVE-2026-33292/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-33292 - High (7.5) WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. ... š https://www.thehackerwire.com/vulnerability/CVE-2026-33292/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33292
- Severity
- High
- CVSS Score
- 7.5
- Type
- path_traversal
- Status
- confirmed
- EPSS
- 3.8%
- Social Posts
- 2
CWE
- CWE-22
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N