CVE-2026-33513 - Vulnerability Analysis
HighCVSS: 8.6Last Updated: March 24, 2026
WWBN AVideo - File Inclusion
Overview
WWBN AVideo <= 26.0 contains a file inclusion vulnerability caused by unsanitized user input concatenated into an include path in the unauthenticated API endpoint 'APIName=locale', letting unauthenticated attackers perform file disclosure and potentially remote code execution if they control PHP files, exploit requires no authentication.
Severity & Score
Impact
Unauthenticated attackers can disclose files and potentially execute arbitrary PHP code, leading to full server compromise.
Mitigation
Update to the latest version once a patch is available.
Social Media Activity(1 post)
š CVE-2026-33513 - High (8.6) WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticated API endpoint (`APIName=locale`) concatenates user input into an `include` path with no canonicalization or whitelist. Path traversal is accepted... š https://www.thehackerwire.com/vulnerability/CVE-2026-33513/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33513
- Severity
- High
- CVSS Score
- 8.6
- Type
- file_inclusion
- Status
- unconfirmed
- EPSS
- 15.4%
- Social Posts
- 1
CWE
- CWE-22
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L