CVE-2026-33485 - Vulnerability Analysis
HighCVSS: 7.5Last Updated: March 24, 2026
WWBN AVideo - SQL Injection
Overview
WWBN AVideo <= 26.0 contains a time-based blind SQL injection caused by unsanitized interpolation of the 'name' parameter in SQL queries in plugin/Live/on_publish.php, letting unauthenticated attackers extract sensitive database contents, exploit requires no authentication.
Severity & Score
Impact
Unauthenticated attackers can extract sensitive database data including user credentials and emails, leading to full data disclosure.
Mitigation
Update to a version including commit af59eade82de645b20183cc3d74467a7eac76549 or later.
References
Social Media Activity(1 post)
š CVE-2026-33485 - High (7.5) WWBN AVideo is an open source video platform. In versions up to and including 26.0, the RTMP `on_publish` callback at `plugin/Live/on_publish.php` is accessible without authentication. The `$_POST['name']` parameter (stream key) is interpolated di... š https://www.thehackerwire.com/vulnerability/CVE-2026-33485/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33485
- Severity
- High
- CVSS Score
- 7.5
- Type
- sql_injection
- Status
- confirmed
- EPSS
- 19.4%
- Social Posts
- 1
CWE
- CWE-89
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N