CVE-2025-25038

| EUVD-2025-18780 CRITICAL
2025-06-20 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-18780
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
PoC Detected
Dec 22, 2025 - 17:46 vuln.today
Public exploit code
CVE Published
Jun 20, 2025 - 19:15 nvd
CRITICAL 9.8

Description

An OS command injection vulnerability exists in MiniDVBLinux version 5.4 and earlier. The system’s web-based management interface fails to properly sanitize user-supplied input before passing it to operating system commands. A remote unauthenticated attacker can exploit this vulnerability to execute arbitrary commands as the root user, potentially compromising the entire device. Exploitation evidence was observed by the Shadowserver Foundation on 2024-04-10 UTC.

Analysis

MiniDVBLinux version 5.4 and earlier contains an unauthenticated OS command injection in the web-based management interface. The DVB streaming platform fails to sanitize user input before passing it to operating system commands, enabling remote attackers to execute arbitrary commands on the media server.

Technical Context

The web management interface passes user-supplied input directly to system commands without sanitization. MiniDVBLinux is used for DVB (Digital Video Broadcasting) streaming. The web interface is typically exposed on the local network for stream management.

Affected Products

['MiniDVBLinux <= 5.4']

Remediation

Update MiniDVBLinux or restrict web interface access to trusted management stations. Implement input sanitization on all web endpoints.

Priority Score

87
Low Medium High Critical
KEV: 0
EPSS: +17.7
CVSS: +49
POC: +20

Share

CVE-2025-25038 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy