๐Ÿ” CVE Alert

CVE-2025-34101

UNKNOWN 0.0

Serviio Media Server Unauthenticated Command Injection via checkStreamUrl VIDEO Parameter

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An unauthenticated command injection vulnerability exists in Serviio Media Server versions 1.4 through 1.8 on Windows, in the /rest/action API endpoint exposed by the console component (default port 23423). The checkStreamUrl method accepts a VIDEO parameter that is passed unsanitized to a call to cmd.exe, enabling arbitrary command execution under the privileges of the web server. No authentication is required to exploit this issue, as the REST API is exposed by default and lacks access controls.

CWE CWE-78 CWE-306 CWE-20
Vendor serviio
Product media server
Published Jul 10, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for serviio media server

Be the first to know when new unknown vulnerabilities affecting serviio media server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Serviio / Media Server
1.4 โ‰ค 1.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
zeroscience.mk: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5408.php packetstorm.news: https://packetstorm.news/files/id/142387 fortiguard.fortinet.com: https://fortiguard.fortinet.com/encyclopedia/ips/44042 raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/serviio_checkstreamurl_cmd_exec.rb vulncheck.com: https://vulncheck.com/advisories/serviio-media-server-unauthenticated-command-injection exploit-db.com: https://www.exploit-db.com/exploits/42023

Credits

Gjoko Krstic of Zero Science Lab