Home

Description

MiniDVBLinux 5.4 contains a remote code execution vulnerability in the SVDRP protocol that allows remote attackers to send commands to manipulate TV systems. Attackers can send crafted SVDRP commands through the svdrpsend.sh script to execute messages and potentially control the video disk recorder remotely.

PUBLISHED Reserved 2025-12-08 | Published 2025-12-09 | Updated 2025-12-09 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-306: Missing Authentication for Critical Function

Product status

Default status
unaffected

<=5.4
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/51093 (ExploitDB-51093) exploit

www.linuxtv.org/vdrwiki/index.php/SVDRP (SVDRP Documentation) media-coverage

www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5714.php (Zero Science Lab Disclosure (ZSL-2022-5714)) third-party-advisory

www.minidvblinux.de (MiniDVBLinux Product Homepage) product

www.vulncheck.com/...recorder-protocol-remote-code-execution (VulnCheck Advisory: MiniDVBLinux 5.4 Simple VideoDiskRecorder Protocol Remote Code Execution) third-party-advisory

cve.org (CVE-2023-53774)

nvd.nist.gov (CVE-2023-53774)