VYPR
Medium severity6.5NVD Advisory· Published Apr 29, 2026· Updated Apr 29, 2026

CVE-2018-25311

CVE-2018-25311

Description

VideoFlow Digital Video Protection DVP 2.10 contains an authenticated directory traversal vulnerability that allows authenticated attackers to disclose arbitrary files by injecting path traversal sequences in the ID parameter. Attackers can submit requests to downloadsys.pl, download_xml.pl, download.pl, downloadmib.pl, or downloadFile.pl with directory traversal payloads to read sensitive system files like /etc/passwd.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

VideoFlow DVP 2.10 has an authenticated directory traversal vulnerability allowing attackers to read arbitrary files via the ID parameter in multiple Perl scripts.

Vulnerability

Overview

VideoFlow Digital Video Protection (DVP) version 2.10 contains an authenticated directory traversal vulnerability. The root cause is insufficient validation of user-supplied input passed to the ID parameter in several Perl scripts, including downloadsys.pl, download_xml.pl, download.pl, downloadmib.pl, and downloadFile.pl. Attackers can inject path traversal sequences (e.g., ../) to read arbitrary files from the server's filesystem [1][2][3].

Exploitation

An attacker must first authenticate to the DVP web interface. Once authenticated, they can craft HTTP requests to the affected scripts with a malicious ID parameter containing directory traversal payloads. The scripts then serve the requested file with a Content-Disposition header, enabling the attacker to download sensitive system files such as /etc/passwd [2][3]. Notably, the session does not expire, which may facilitate prolonged exploitation [2].

Impact

Successful exploitation allows an authenticated attacker to disclose arbitrary files on the DVP appliance. This could expose configuration files, credentials, or other sensitive data, potentially leading to further compromise of the device or the network it protects [1][2][3].

Mitigation

As of the publication date, no official patch has been confirmed for this vulnerability. Users of VideoFlow DVP 2.10 should restrict network access to the management interface and monitor for unauthorized file access attempts. Given the lack of vendor response noted in the advisory, upgrading to a newer version or applying workarounds such as input validation filters may be necessary [1][2][3].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.