Description
A server-side request forgery vulnerability exists in multiple firmware versions of AVTECH DVR devices that exposes the /cgi-bin/nobody/Search.cgi?action=cgi_query endpoint without authentication. An attacker can manipulate the ip, port, and queryb64str parameters to make arbitrary HTTP requests from the DVR to internal or external systems, potentially exposing sensitive data or interacting with internal services.
Published: 2025-07-01
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote data exposure
Action: Patch
AI Analysis

Impact

An unauthenticated attacker can manipulate the ip, port, and queryb64str parameters of the /cgi-bin/nobody/Search.cgi endpoint to cause the affected AVTECH DVR device to issue arbitrary HTTP requests to internal or external systems. Because the endpoint is publicly exposed, the attacker can retrieve sensitive data from internal services or interact with external resources, leading to potential data leakage and unauthorized configuration adjustments. The weakness is a server‑side request forgery (CWE‑918) combined with a potential data‑exposure flaw (CWE‑200).

Affected Systems

AVTECH DVR devices running the firmware versions identified in the advisory are affected. The provided CNA list does not specify exact firmware revisions, but any device that exposes the /cgi-bin/nobody/Search.cgi endpoint without authentication is vulnerable. Administrators should review firmware documentation for their installed version and verify whether the Search.cgi endpoint remains exposed.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, while the EPSS score of < 1% shows that exploitation is currently unlikely and the vulnerability is not listed in the CISA KEV catalog. If an attacker can reach the exposed endpoint—typically via the device’s HTTP interface over a local or scoped network—they can initiate outbound requests from the DVR to arbitrary hosts, potentially exfiltrating data or attacking internal services. The likely attack vector is a remote or local network request to the vulnerable endpoint, inferred from the need to reach /cgi-bin/nobody/Search.cgi.

Generated by OpenCVE AI on April 28, 2026 at 01:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade firmware to a revision where the /cgi-bin/nobody/Search.cgi endpoint requires authentication or has been removed.
  • Strictly restrict network access to the DVR’s HTTP interface, using firewall rules or VLAN isolation to prevent unauthorized reach.
  • If firmware upgrades or endpoint removal are not feasible, disable or block the /cgi-bin/nobody/Search.cgi endpoint through local device configuration or a reverse‑proxy that rejects the request.
  • Monitor outbound traffic from the DVR for unusual or unapproved destination requests to detect potential exploitation.

Generated by OpenCVE AI on April 28, 2026 at 01:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19631 A server-side request forgery vulnerability exists in multiple firmware versions of AVTECH DVR devices that exposes the /cgi-bin/nobody/Search.cgi?action=cgi_query endpoint without authentication. An attacker can manipulate the ip, port, and queryb64str parameters to make arbitrary HTTP requests from the DVR to internal or external systems, potentially exposing sensitive data or interacting with internal services.
History

Tue, 01 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
Description A server-side request forgery vulnerability exists in multiple firmware versions of AVTECH DVR devices that exposes the /cgi-bin/nobody/Search.cgi?action=cgi_query endpoint without authentication. An attacker can manipulate the ip, port, and queryb64str parameters to make arbitrary HTTP requests from the DVR to internal or external systems, potentially exposing sensitive data or interacting with internal services.
Title AVTECH DVR Devices Server-Side Request Forgery
Weaknesses CWE-200
CWE-918
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:09:14.685Z

Reserved: 2025-04-15T19:15:22.548Z

Link: CVE-2025-34051

cve-icon Vulnrichment

Updated: 2025-07-01T14:54:53.451Z

cve-icon NVD

Status : Deferred

Published: 2025-07-01T15:15:23.467

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-34051

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T01:30:17Z

Weaknesses