CVE-2019-25251
Unknown Unknown - Not Provided
Server-Side Request Forgery in Teradek VidiU Pro Management Interface

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: VulnCheck

Description
Teradek VidiU Pro 3.0.3 contains a server-side request forgery vulnerability in the management interface that allows attackers to manipulate GET parameters 'url' and 'xml_url'. Attackers can exploit this flaw to bypass firewalls, initiate network enumeration, and potentially trigger external HTTP requests to arbitrary destinations.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 9 associated CPEs
Vendor Product Version / Range
teradek vidiu_mini 3.0.3
teradek vidiu 3.0.3
teradek vidiu_mini 2.4.10
teradek vidiu 2.4.10
teradek vidiu_mini 3.0.2
teradek vidiu_pro 3.0.3
teradek vidiu 3.0.2
teradek vidiu_pro 3.0.2
teradek vidiu_pro 2.4.10
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not explicitly discuss the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA. However, the vulnerability allows attackers to bypass firewalls, perform internal network enumeration, and potentially disclose sensitive information via XML External Entity (XXE) attacks, which could lead to unauthorized access to sensitive data. Such unauthorized access and data exposure could negatively impact compliance with data protection regulations that require safeguarding sensitive information. [1, 2]


Can you explain this vulnerability to me?

CVE-2019-25251 is a Server-Side Request Forgery (SSRF) vulnerability in Teradek VidiU Pro version 3.0.3 and related versions. It exists in the management interface, specifically in the RTMP settings and Wowza server mode, where user-supplied GET parameters 'url' and 'xml_url' are used without proper validation. This allows an attacker to manipulate these parameters to make the device send HTTP requests to arbitrary external or internal hosts. This can be exploited to bypass firewalls, perform internal network and service enumeration, and potentially trigger XML External Entity (XXE) attacks due to XML parsing of the responses. [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to bypass firewalls and access internal network resources through the vulnerable device. Attackers can perform network enumeration to discover internal services and potentially exploit further vulnerabilities. Additionally, the SSRF can lead to XML External Entity (XXE) attacks, which may disclose sensitive information. Overall, it poses a risk of exposing system and sensitive information and could lead to unauthorized system access. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring and testing the vulnerable endpoints that process the 'url' and 'xml_url' GET parameters. Specifically, you can send crafted HTTP GET requests to the following endpoints to check if the system makes external HTTP requests: 1. /cgi-bin/wowza.cgi?command=read_url&url=<test_url> 2. /cgi-bin/system.cgi?command=rtmp&action=rtmp_xml_from_url&xml_url=<test_url> By substituting <test_url> with arbitrary external domains or IP addresses and ports, you can observe if the device attempts to connect to those addresses, indicating SSRF vulnerability. For example, using curl commands: curl 'http://<device_ip>/cgi-bin/wowza.cgi?command=read_url&url=http://example.com' curl 'http://<device_ip>/cgi-bin/system.cgi?command=rtmp&action=rtmp_xml_from_url&xml_url=http://example.com' Additionally, proof-of-concept CSRF HTML forms exist to automate blind SSRF and XXE testing. Monitoring network traffic for unexpected outbound HTTP requests from the device to arbitrary hosts can also help detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the management interface of the Teradek VidiU Pro device to trusted networks and users only, effectively preventing unauthorized external access. Network-level controls such as firewall rules should be implemented to block outbound HTTP requests from the device to untrusted or arbitrary external hosts. If possible, disable or restrict the vulnerable RTMP settings and Wowza server mode functionality until a patch or update is available. Monitoring and logging should be enhanced to detect suspicious activity related to the vulnerable endpoints. Since the vendor did not respond before the advisory release, applying any available firmware updates or patches from Teradek should be prioritized once released. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart