Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 12 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-537 |
Fri, 09 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:minidvblinux:minidvblinux:5.4:*:*:*:*:*:*:* |
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Minidvblinux
Minidvblinux minidvblinux |
|
| Vendors & Products |
Minidvblinux
Minidvblinux minidvblinux |
Fri, 02 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MiniDVBLinux 5.4 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary commands as root through the 'command' GET parameter. Attackers can exploit the /tpl/commands.sh endpoint by sending malicious command values to gain root-level system access. | |
| Title | MiniDVBLinux 5.4 Remote Root Command Execution via commands.sh | |
| Weaknesses | CWE-537 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:06:58.500Z
Reserved: 2025-12-21T19:48:13.435Z
Link: CVE-2022-50691
Updated: 2026-01-02T14:26:04.076Z
Status : Modified
Published: 2025-12-30T23:15:43.620
Modified: 2026-01-12T14:16:00.837
Link: CVE-2022-50691
No data.
OpenCVE Enrichment
Updated: 2026-01-05T10:19:28Z