Advisory: RCE and Arbitrary File Read in AV Stumpfl Pixera Two Media Server < 25.2 R3

CVE-2026-7703, CVE-2026-7704


Overview

Two security issues were found in Pixera Two Media Server:

  1. Remote Code Execution (RCE) in Pixera Two Media Server
  2. Arbitrary File Read in Pixera Two Media Server

Affected Products

  • Model: Pixera Two Media Server
  • Software Version: < 25.2 R3

Mitigation

  1. Update to Pixera version 25.2 R3, released on 14 Oct 25. In this version, Pixera introduced API allow-listing, defaulting to restricted APIs rather than all enabled. Extra care should be taken when allow-listing sensitive APIs such as filesystem, web-related, and system utility APIs.
    • Reference: Pixera Changelog
    • Note: It appears Pixera's version format has changed over time. Previously, it used 2.0.XXX. Now it seems to use the year of release plus a minor version and revision number such as 25.2 R3.
  2. To prevent unauthorised access to the device, in addition to upgrading, it is recommended to change the default password of the VNC server hosted by the Pixera device. This is a separate component and accessed on a different port from the ones described below.

If upgrading is not possible, consider a workaround of applying strict IP whitelisting on port 1338, such that the web panel and API can only be accessed from dedicated, trusted sources.

Vulnerability 1 – Remote Code Execution (CVE-2026-7703)

1.1. Description

An unauthenticated person with network access can achieve Remote Code Execution (RCE) on a Pixera Two Media Server by abusing the websocket API on the web server running on port 1338, enabled by default. This issue allows anyone on the network to take control of the Pixera media server, allowing them to run arbitrary commands and pivot across connected networks.

1.2. PoC

WebSocket Payload:

{
    "type":"Request",
    "sequence":100,
    "address":"Utils.Redacted.redacted",
    "params":[
        "calc.exe",
        ""
    ]
}
JSON

Certain parts of the PoC have been redacted in the interest of security.

Run calc.exe in a local deployment

Figure 1A: Run calc.exe in a local deployment.

Obtain a reverse shell in a remote deployment

Figure 1B: Obtain a reverse shell in a remote deployment.

1.3. Impact

Commands are executed as the avstumpfl user, which has Administrator privileges on the Windows server. Attackers can execute arbitrary commands on the media server, unlock further actions through UAC bypass, and pivot across the network.

1.4. Severity

Suggested CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

Base Score: 9.4 (Critical)

  • Attack Vector (AV): Network
  • Attack Complexity (AC): Low
  • Privileges Required (PR): None
  • User Interaction (UI): None
  • Scope (S): Unchanged
  • Confidentiality Loss (C): Low
  • Integrity Loss (I): High
  • Availability Loss (A): High

Justification:

  • Low loss in confidentiality due to the nature of media servers. Media files are generally non-sensitive, especially ones meant to be displayed on-screen to an audience. The more severe impacts lie in loss of availability and the potential for network pivoting.

Vulnerability 2 – Arbitrary File Read (CVE-2026-7704)

2.1. Description

An unauthenticated person with network access can read arbitrary files on the Pixera Two Media Server by targeting the web server hosted on port 1338, enabled by default.

2.2. PoC

http://TARGET:1338/..\..\..\..\..\..\windows\win.ini

Path traversal to win.ini

Figure 2A: Path traversal to win.ini

Path traversal to a file containing the Pixera build version

Figure 2B: Path traversal to a file containing the Pixera build version.

2.3. Impact

The exploitation of this vulnerability can lead to unauthorized disclosure of information, potentially leading to system compromise. For instance, attackers may leverage this vulnerability to leak system files or registry data which may disclose login hashes to be cracked.

2.4. Severity

Suggested CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Base Score: 5.3 (Medium)

  • Attack Vector (AV): Network
  • Attack Complexity (AC): Low
  • Privileges Required (PR): None
  • User Interaction (UI): None
  • Scope (S): Unchanged
  • Confidentiality Loss (C): Low
  • Integrity Loss (I): None
  • Availability Loss (A): None

Timeline

  • 2025.07.04 - Vulnerability reported to AV Stumpfl
  • 2025.07.28 - Report received by AV Stumpfl
  • 2025.09.16 - Disclosure to MITRE requesting CVE-ID (no response)
  • 2025.10.14 - Patch released (25.2 R3) by AV Stumpfl
  • 2026.04.15 - Disclosure to VulDB
  • 2026.05.03 - Disclosure published by VulDB

Credit

  • Johnathan Law from PwC HK DarkLab

Share on


Comments are back! Privacy-focused; without ads, bloatware 🤮, and trackers. Be one of the first to contribute to the discussion— before AI invades social media, world leaders declare war on guppies, and what little humanity left is lost to time.