Teradek VidiU Pro 3.0.3 contains a server-side request forgery vulnerability in the management interface that allows attackers to manipulate GET parameters 'url' and 'xml_url'. Attackers can exploit this flaw to bypass firewalls, initiate network enumeration, and potentially trigger external HTTP requests to arbitrary destinations.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 22 Jan 2026 05:00:00 +0900

Type Values Removed Values Added
First Time appeared Teradek vidiu Firmware
Teradek vidiu Mini
Teradek vidiu Mini Firmware
Teradek vidiu Pro
Teradek vidiu Pro Firmware
CPEs cpe:2.3:h:teradek:vidiu:-:*:*:*:*:*:*:*
cpe:2.3:h:teradek:vidiu_mini:-:*:*:*:*:*:*:*
cpe:2.3:h:teradek:vidiu_pro:-:*:*:*:*:*:*:*
cpe:2.3:o:teradek:vidiu_firmware:2.4.10:*:*:*:*:*:*:*
cpe:2.3:o:teradek:vidiu_firmware:3.0.2:build31225:*:*:*:*:*:*
cpe:2.3:o:teradek:vidiu_firmware:3.0.3:build32136:*:*:*:*:*:*
cpe:2.3:o:teradek:vidiu_mini_firmware:2.4.10:*:*:*:*:*:*:*
cpe:2.3:o:teradek:vidiu_mini_firmware:3.0.2:build31225:*:*:*:*:*:*
cpe:2.3:o:teradek:vidiu_mini_firmware:3.0.3:build32136:*:*:*:*:*:*
cpe:2.3:o:teradek:vidiu_pro_firmware:2.4.10:*:*:*:*:*:*:*
cpe:2.3:o:teradek:vidiu_pro_firmware:3.0.2:build31225:*:*:*:*:*:*
cpe:2.3:o:teradek:vidiu_pro_firmware:3.0.3:build32136:*:*:*:*:*:*
Vendors & Products Teradek vidiu Firmware
Teradek vidiu Mini
Teradek vidiu Mini Firmware
Teradek vidiu Pro
Teradek vidiu Pro Firmware

Tue, 30 Dec 2025 08:15:00 +0900

Type Values Removed Values Added
First Time appeared Teradek
Teradek vidiu
Vendors & Products Teradek
Teradek vidiu

Thu, 25 Dec 2025 06:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 25 Dec 2025 04:45:00 +0900

Type Values Removed Values Added
Description Teradek VidiU Pro 3.0.3 contains a server-side request forgery vulnerability in the management interface that allows attackers to manipulate GET parameters 'url' and 'xml_url'. Attackers can exploit this flaw to bypass firewalls, initiate network enumeration, and potentially trigger external HTTP requests to arbitrary destinations.
Title Teradek VidiU Pro 3.0.3 Server-Side Request Forgery via RTMP Settings
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-24T20:22:13.312Z

Reserved: 2025-12-24T14:27:12.478Z

Link: CVE-2019-25251

cve-icon Vulnrichment

Updated: 2025-12-24T20:01:58.670Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-24T20:15:53.553

Modified: 2026-01-21T19:48:29.210

Link: CVE-2019-25251

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-30T08:04:32Z

Weaknesses