An OS command injection vulnerability exists in MiniDVBLinux version 5.4 and earlier. The system’s web-based management interface fails to properly sanitize user-supplied input before passing it to operating system commands. A remote unauthenticated attacker can exploit this vulnerability to execute arbitrary commands as the root user, potentially compromising the entire device.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5717.php | third party advisory exploit |
https://www.exploit-db.com/exploits/51096 | third party advisory exploit |
https://www.fortiguard.com/encyclopedia/ips/52454 | third party advisory |
https://cxsecurity.com/issue/WLB-2022100039 | third party advisory exploit |
https://packetstormsecurity.com/files/168744/ | third party advisory exploit |
https://www.minidvblinux.de | product |
https://vulncheck.com/advisories/minidvblinux-command-injection | third party advisory |