A critical remote code execution (RCE) vulnerability, identified as CVE-2025-27441, has been discovered in the popular NexusStreamer media server software. The flaw, which has been assigned a CVSS score of 9.8 (Critical), allows unauthenticated attackers to take complete control of affected servers, posing a significant risk to organizations and individuals using the platform for video streaming and content delivery.
The vulnerability was disclosed on February 18, 2025, by security researchers at a cybersecurity firm, who reported it responsibly to the vendor. A patch has been released, and administrators are urged to update their systems immediately to prevent potential exploitation.
Understanding the ‘Stream-Ject’ Vulnerability
Dubbed ‘Stream-Ject’ by researchers, the vulnerability resides within the media playlist parsing engine of NexusStreamer versions 3.5.0 through 3.8.2. The flaw is an improper input validation weakness when processing specially crafted HLS (.m3u8) playlist files. An attacker can create a malicious playlist file containing embedded OS commands. When the NexusStreamer server ingests this file for processing, it fails to properly sanitize the input, leading to the execution of the embedded commands with the same privileges as the server process, which is often root or a high-privileged user.
This means an attacker could, without any authentication, upload a malicious file and achieve full remote code execution. The attack vector is straightforward and can be automated, increasing the likelihood of widespread exploitation. All platforms running the affected versions of NexusStreamer, including Linux, Windows, and containerized deployments, are vulnerable.
Impact and Immediate Mitigation Steps
The impact of CVE-2025-27441 is severe. A successful exploit could lead to a complete compromise of the media server. Attackers could steal or manipulate sensitive video content, use the server as a pivot point to attack internal networks, deploy ransomware, or incorporate the server into a botnet for DDoS attacks. Given the high bandwidth available to many media servers, their inclusion in a botnet is a particularly dangerous possibility.
Administrators are strongly advised to take the following steps immediately:
- Patch Immediately: The primary mitigation is to upgrade all NexusStreamer instances to version 3.8.3 or newer. The vendor, StreamCore, has released a security bulletin with detailed patching instructions, which can be found on their official security advisory page.
- Restrict Access: As a temporary measure until patching is complete, administrators should restrict access to the playlist upload interface. Limit access to trusted IP addresses only and place the server behind a properly configured Web Application Firewall (WAF) with rules designed to inspect and block malicious file uploads.
- Review Server Logs: Security teams should audit server logs for any unusual activity, such as unexpected playlist uploads from unknown sources or suspicious outbound network traffic, which could indicate a compromise.
Do not delay. Due to the critical nature of this vulnerability and the simplicity of its exploitation, it is expected that threat actors will begin actively scanning for and attacking vulnerable systems in the very near future.