WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `aVideoEncoderChunk.json.php` endpoint is a completely standalone PHP script with no authentication, no framework includes, and no resource limits. An unauthenticated remote attacker can send arbitrary POST data which is written to persistent temp files in `/tmp/` with no size cap, no rate limiting, and no cleanup mechanism. This allows trivial disk space exhaustion leading to denial of service of the entire server. Commit 33d1bae6c731ef1682fcdc47b428313be073a5d1 contains a patch.
References
| Link | Resource |
|---|---|
| https://github.com/WWBN/AVideo/commit/33d1bae6c731ef1682fcdc47b428313be073a5d1 | Patch |
| https://github.com/WWBN/AVideo/security/advisories/GHSA-vv7w-qf5c-734w | Exploit Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-23 15:16
Updated : 2026-03-24 18:36
NVD link : CVE-2026-33483
Mitre link : CVE-2026-33483
CVE.ORG link : CVE-2026-33483
JSON object : View
Products Affected
wwbn
- avideo
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
