dizqueTV 1.5.3 contains a remote code execution vulnerability that allows attackers to inject arbitrary commands through the FFMPEG Executable Path settings. Attackers can modify the executable path with shell commands to read system files like /etc/passwd by exploiting improper input validation.
Metrics
Affected Vendors & Products
References
History
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vexorian
Vexorian dizquetv |
|
| Vendors & Products |
Vexorian
Vexorian dizquetv |
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dizqueTV 1.5.3 contains a remote code execution vulnerability that allows attackers to inject arbitrary commands through the FFMPEG Executable Path settings. Attackers can modify the executable path with shell commands to read system files like /etc/passwd by exploiting improper input validation. | |
| Title | dizqueTV 1.5.3 Remote Code Execution via FFMPEG Executable Path | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-11T21:32:57.246Z
Updated: 2025-12-11T21:32:57.246Z
Reserved: 2025-12-10T23:46:14.008Z
Link: CVE-2024-58286
No data.
Status : Received
Published: 2025-12-11T22:15:48.203
Modified: 2025-12-11T22:15:48.203
Link: CVE-2024-58286
No data.