CVE-2018-25310
Description
VideoFlow Digital Video Protection DVP 2.10 contains an authenticated remote code execution vulnerability that allows authenticated attackers to execute arbitrary system commands by exploiting a cross-site request forgery flaw in the web management interface. Attackers with valid credentials can leverage the CSRF vulnerability to inject and execute system commands through the Tools > System > Shell interface, gaining root-level access to the device.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
VideoFlow DVP 2.10 suffers from an authenticated remote code execution vulnerability via CSRF, allowing attackers with valid credentials to execute arbitrary root-level commands.
The vulnerability is a cross-site request forgery (CSRF) flaw in the web management interface of VideoFlow Digital Video Protection (DVP) version 2.10. An authenticated attacker can craft a malicious request that, when processed by an administrative session, executes arbitrary system commands through the Tools > System > Shell interface. The root cause is the absence of CSRF protection in this functionality, allowing command injection without user interaction [1][3][4].
Exploitation requires valid credentials, as the attacker must be authenticated to the web interface. The default credentials (admin:admin, oper:oper, etc.) are well-known, making it trivial for an attacker who gains access to a network with a DVP device to authenticate and then craft a CSRF payload. The attack is network-based, requiring only that the victim admin visits a malicious page while logged into the DVP interface [3].
Successful exploitation grants root-level access to the underlying operating system (CentOS). Since DVP is used for live video broadcast protection, an attacker can disrupt video streams, exfiltrate data, or pivot to other network segment. The vulnerability affects multiple firmware versions, including the tested 1.40.0.15 and 2.10.0.5 [3][4].
As of the public disclosure dates (February 2018), no official patch was available. Mitigation includes changing default credentials, restricting network access to the management interface, and implementing generic CSRF defenses such as same-site cookies. The vulnerability is listed on Exploit-DB (EDB-ID 44387) and VulnCheck [3][4].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 2.10
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.