Multiple Security vulnerabilities Found in WWBN AVideo, MedDream, and Eclipse ThreadX


Cisco Talos’ Vulnerability Discovery & Research team has disclosed a total of 12 critical security vulnerabilities across three popular software platforms, highlighting significant security risks that could potentially impact millions of users worldwide.

The disclosure includes seven vulnerabilities in WWBN AVideo, four in MedDream PACS Premium, and one in Eclipse ThreadX FileX, all of which have been patched by their respective vendors in accordance with Cisco’s third-party vulnerability disclosure policy.

WWBN AVideo Platform Faces Multiple Attack Vectors

WWBN AVideo, a widely used video streaming platform offering hosting, management, and monetization features, was found to contain seven distinct vulnerabilities discovered by Claudio Bozzato of Cisco Talos.

ProductCVEVulnerability TypeImpact
WWBN AVideoCVE-2025-46410XSSJavaScript Execution
WWBN AVideoCVE-2025-53084XSSJavaScript Execution
WWBN AVideoCVE-2025-50128XSSJavaScript Execution
WWBN AVideoCVE-2025-36548XSSJavaScript Execution
WWBN AVideoCVE-2025-41420XSSJavaScript Execution
WWBN AVideoCVE-2025-25214Race ConditionCode Execution
WWBN AVideoCVE-2025-48732Incomplete BlacklistCode Execution
MedDreamCVE-2025-26469Incorrect PermissionsCredential Exposure
MedDreamCVE-2025-27724Privilege EscalationElevated Capabilities
MedDreamCVE-2025-32731Reflected XSSJavaScript Execution
MedDreamCVE-2025-24485SSRFServer-Side Request Forgery
Eclipse ThreadXCVE-2024-2088Buffer OverflowCode Execution

Five of these involve cross-site scripting (XSS) vulnerabilities that could allow attackers to execute arbitrary JavaScript code through specially crafted HTTP requests targeting users who visit malicious webpages.

The most concerning discoveries involve two vulnerabilities that, when chained together, enable complete system compromise through arbitrary code execution.

These include a race condition vulnerability in the aVideoEncoder.json.php unzip functionality and an incomplete blacklist in the .htaccess configuration that permits dangerous .phar file requests.

MedDream PACS Premium Security Concerns

The medical imaging sector faces significant risks as MedDream PACS Premium, a DICOM 3.0 compliant picture archiving and communication system, contains four critical vulnerabilities discovered by Emmanuel Tacheau and Marcin Noga of Cisco Talos.

These vulnerabilities range from incorrect default permissions that could expose encrypted credentials to privilege escalation flaws and server-side request forgery attacks.

Eclipse ThreadX Impact on Embedded Systems

Eclipse ThreadX, an embedded development suite for real-time operating systems used in resource-constrained devices, contains a buffer overflow vulnerability in its FileX RAM disk driver.

Discovered by Kelly Patterson, this vulnerability could enable code execution through specially crafted network packets.

Organizations using these platforms should immediately apply available patches and update to the latest versions.

For additional protection, administrators can download the latest Snort rule sets from Snort.org to detect potential exploitation attempts. Cisco Talos continues to monitor these vulnerabilities and provides updated advisories through the Talos Intelligence website.

The Ultimate SOC-as-a-Service Pricing Guide for 2025– Download for Free



Source link