MiniDVBLinux 5.4 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands as root through the 'command' GET parameter. Attackers can exploit the /tpl/commands.sh endpoint by sending malicious command values to gain root-level system access.
References
| Link | Resource |
|---|---|
| https://packetstormsecurity.com/files/168749/ | Third Party Advisory |
| https://www.vulncheck.com/advisories/minidvblinux-remote-root-command-execution-via-commandssh | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5718.php | Exploit Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5718.php | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-30 23:15
Updated : 2026-01-12 14:16
NVD link : CVE-2022-50691
Mitre link : CVE-2022-50691
CVE.ORG link : CVE-2022-50691
JSON object : View
Products Affected
minidvblinux
- minidvblinux
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
