Impact
An unauthenticated remote attacker can send arbitrary POST data to the aVideoEncoderChunk.json.php endpoint, which writes the data to temporary files in /tmp without a size limit or cleanup, quickly consuming disk space and causing a denial of service that impacts the entire server. The weakness is classified as CWE-770, indicating uncontrolled resource consumption.
Affected Systems
WWBN AVideo, an open‑source video platform, is impacted. Versions up to and including 26.0 contain the vulnerable script. All installations running these versions that expose the endpoint to external traffic are at risk.
Risk and Exploitability
The CVSS score of 7.5 classifies the issue as high severity, while the EPSS score is below 1%, suggesting a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it by sending unauthenticated POST requests to the exposed endpoint, creating unlimited temporary files; no special privileges or authentication are required, making it trivial to trigger once the script is reachable over the network.
OpenCVE Enrichment
Github GHSA