Description
A weakness has been identified in justdan96 tsMuxer up to 2.7.0. This vulnerability affects the function HevcVpsUnit::setFPS of the file /AFLplusplus/tsMuxer_prev/tsMuxer/hevc.cpp. This manipulation of the argument track_id causes denial of service. The attack requires local access. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-05-04
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A vulnerability exists in the HevcVpsUnit::setFPS function of justdan96 tsMuxer up to version 2.7.0. By manipulating the track_id argument, a local attacker can trigger a denial of service. The flaw is identified as CWE‑404, and it causes the tsMuxer process to terminate, disrupting media multiplexing tasks.

Affected Systems

The affected product is justdan96 tsMuxer, with all releases up to and including 2.7.0 included. These older releases are no longer supported by the maintainer, so users running them are at risk. No other vendors or products are listed as affected.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate severity. The EPSS score is not available, so a quantitative exploitation probability cannot be determined. The vulnerability is not listed in the CISA KEV catalog. Local access is required to exploit the flaw, which limits the threat to users who can run code on the affected machine. Because a publicly available proof‑of‑concept exists, any local user who can interact with tsMuxer could trigger the denial of service, potentially interrupting streaming services or other dependent processes.

Generated by OpenCVE AI on May 4, 2026 at 07:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a supported release of tsMuxer that incorporates the patch.
  • Restrict local access to the tsMuxer process by running it under a restricted user account, using containerization, or enforcing SELinux/AppArmor policies to limit the impact of a local exploit.
  • If a supported update is unavailable, replace tsMuxer with an alternative media multiplexing tool that does not contain this flaw.

Generated by OpenCVE AI on May 4, 2026 at 07:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 06:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in justdan96 tsMuxer up to 2.7.0. This vulnerability affects the function HevcVpsUnit::setFPS of the file /AFLplusplus/tsMuxer_prev/tsMuxer/hevc.cpp. This manipulation of the argument track_id causes denial of service. The attack requires local access. The exploit has been made available to the public and could be used for attacks. This vulnerability only affects products that are no longer supported by the maintainer.
Title justdan96 tsMuxer hevc.cpp setFPS denial of service
First Time appeared Justdan96
Justdan96 tsmuxer
Weaknesses CWE-404
CPEs cpe:2.3:a:justdan96:tsmuxer:*:*:*:*:*:*:*:*
Vendors & Products Justdan96
Justdan96 tsmuxer
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Justdan96 Tsmuxer
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-04T12:48:41.801Z

Reserved: 2026-05-03T17:13:32.604Z

Link: CVE-2026-7739

cve-icon Vulnrichment

Updated: 2026-05-04T12:48:38.278Z

cve-icon NVD

Status : Deferred

Published: 2026-05-04T07:16:02.053

Modified: 2026-05-04T15:17:58.710

Link: CVE-2026-7739

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T08:00:09Z

Weaknesses