A login attempt restriction bypass vulnerability exists in the checkLoginAttempts functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to captcha bypass, which can be abused by an attacker to brute force user credentials. An attacker can send a series of HTTP requests to trigger this vulnerability.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2023-1898 | Exploit Third Party Advisory |
| https://talosintelligence.com/vulnerability_reports/TALOS-2023-1898 | Exploit Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1898 |
Configurations
History
04 Nov 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 08:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1898 - Exploit, Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.3 |
17 Jan 2024, 15:07
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-10 16:15
Updated : 2025-11-04 19:16
NVD link : CVE-2023-49810
Mitre link : CVE-2023-49810
CVE.ORG link : CVE-2023-49810
JSON object : View
Products Affected
wwbn
- avideo
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts
