dizqueTV 1.5.3 contains a remote code execution vulnerability that allows attackers to inject arbitrary commands through the FFMPEG Executable Path settings. Attackers can modify the executable path with shell commands to read system files like /etc/passwd by exploiting improper input validation.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vexorian
Vexorian dizquetv |
|
| Vendors & Products |
Vexorian
Vexorian dizquetv |
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | dizqueTV 1.5.3 contains a remote code execution vulnerability that allows attackers to inject arbitrary commands through the FFMPEG Executable Path settings. Attackers can modify the executable path with shell commands to read system files like /etc/passwd by exploiting improper input validation. | |
| Title | dizqueTV 1.5.3 Remote Code Execution via FFMPEG Executable Path | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-11T21:32:57.246Z
Reserved: 2025-12-10T23:46:14.008Z
Link: CVE-2024-58286
No data.
Status : Awaiting Analysis
Published: 2025-12-11T22:15:48.203
Modified: 2025-12-12T15:17:31.973
Link: CVE-2024-58286
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:49:48Z
Weaknesses