VYPR
Medium severity6.5NVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2019-25256

CVE-2019-25256

Description

VideoFlow Digital Video Protection DVP 2.10 contains an authenticated directory traversal vulnerability that allows attackers to access arbitrary system files through unvalidated 'ID' parameters. Attackers can exploit multiple Perl scripts like downloadsys.pl to read sensitive files by manipulating directory path traversal in download requests.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated directory traversal in VideoFlow DVP 2.10 allows attackers to read arbitrary system files via unvalidated 'ID' parameter in Perl scripts.

The vulnerability is an authenticated directory traversal in VideoFlow Digital Video Protection (DVP) version 2.10. The root cause is insufficient validation of the 'ID' parameter in several Perl scripts (e.g., download.pl, download_xml.pl, downloadmib.pl, downloadFile.pl) that handle file downloads. The parameter is directly used in the Content-Disposition header and file path without sanitization, allowing path traversal sequences [2].

An attacker with valid authentication credentials can exploit this by sending crafted requests to the affected scripts, manipulating the 'ID' parameter with directory traversal sequences (e.g., ../) to read arbitrary files outside the intended directory. The vulnerability is present in multiple scripts, as identified in the exploit database entry [2]. No session expiration mechanism further aids exploitation.

Successful exploitation allows an attacker to read sensitive system files, including configuration files, credentials, or other data stored on the DVP appliance. This could lead to further compromise of the device or network. The CVSS score of 6.5 reflects the medium severity due to the requirement for authentication.

The vulnerability was publicly disclosed in 2018 via Zero Science Lab [1] and Exploit-DB [2]. Users should contact VideoFlow for a patched version or apply vendor-supplied mitigations. As of the CVE publication date (2025-12-24), no evidence of exploitation in the wild is mentioned, but upgrading to a non-vulnerable version is recommended.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.