CVE-2025-34101
Serviio Media Server Unauthenticated Command Injection via checkStreamUrl VIDEO Parameter
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
An unauthenticated command injection vulnerability exists in Serviio Media Server versions 1.4 through 1.8 on Windows, in the /rest/action API endpoint exposed by the console component (default port 23423). The checkStreamUrl method accepts a VIDEO parameter that is passed unsanitized to a call to cmd.exe, enabling arbitrary command execution under the privileges of the web server. No authentication is required to exploit this issue, as the REST API is exposed by default and lacks access controls.
| CWE | CWE-78 CWE-306 CWE-20 |
| Vendor | serviio |
| Product | media server |
| Published | Jul 10, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for serviio media server
Be the first to know when new unknown vulnerabilities affecting serviio media server are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Serviio / Media Server
1.4 โค 1.8
References
zeroscience.mk: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5408.php packetstorm.news: https://packetstorm.news/files/id/142387 fortiguard.fortinet.com: https://fortiguard.fortinet.com/encyclopedia/ips/44042 raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/serviio_checkstreamurl_cmd_exec.rb vulncheck.com: https://vulncheck.com/advisories/serviio-media-server-unauthenticated-command-injection exploit-db.com: https://www.exploit-db.com/exploits/42023
Credits
Gjoko Krstic of Zero Science Lab