Impact
A flaw discovered in wvp-GB28181-pro up to version 2.7.4, specifically in the Stream Proxy Query Handler, arises when the selectAll method receives unsanitized input. This vulnerability allows remote attackers to inject arbitrary SQL statements, which can read, modify, or delete database records, expose sensitive data, and provide a foothold for further compromise. A public exploit has been released, and the vendor has not responded to alerts.
Affected Systems
All installations of wvp-GB28181-pro up to version 2.7.4 are impacted. Administrators should verify the exact version they run and compare it against the stated upper bound to determine vulnerability status.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate impact; however, the flaw provides remote access without the need for local privileges, and a public exploit has already been released. The EPSS score is less than 1% and the vulnerability is not listed in the KEV catalog, suggesting a low but non‑zero risk of exploitation, yet the ability to act remotely remains significant for exposed deployments.
OpenCVE Enrichment