Description
VideoLAN VLC for Android prior to version 3.7.0 contains an authentication bypass in the Remote Access Server feature due to missing or insufficient rate limiting on one-time password (OTP) verification. The Remote Access Server uses a 4-digit OTP and does not enforce effective throttling or lockout within the OTP validity window, allowing an attacker with network reachability to the server to repeatedly attempt OTP verification until a valid user_session cookie is issued. Successful exploitation results in unauthorized access to the Remote Access interface, limited to media files explicitly shared by the VLC for Android user.
INFO
Published Date :
2026-02-26T17:37:19.896Z
Last Modified :
2026-03-05T01:31:01.159Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-26227 vulnerability.
| Vendors | Products |
|---|---|
| Videolan |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-26227.