Cyber Posture

CVE-2024-51442

High

Published: 08 January 2025

Published
08 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.3274 96.9th percentile
Risk Priority 37 60% EPSS · 20% KEV · 20% CVSS

Description

Command Injection in Minidlna version v1.3.3 and before allows an attacker to execute arbitrary OS commands via a specially crafted minidlna.conf configuration file.

Security Summary

CVE-2024-51442 is a command injection vulnerability (CWE-77) affecting MiniDLNA versions 1.3.3 and earlier. It enables an attacker to execute arbitrary operating system commands by supplying a specially crafted minidlna.conf configuration file. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.

A remote attacker can exploit this vulnerability over the network with low complexity and no required privileges, but it necessitates user interaction, such as tricking an administrator or user into loading the malicious configuration file. Successful exploitation grants arbitrary command execution on the host system running the vulnerable MiniDLNA instance, potentially leading to full remote code execution, data theft, modification, or denial of service.

Mitigation details and patches are referenced in advisories including the GitHub repository at https://github.com/mselbrede/CVE-2024-51442, the MiniDLNA bug tracker at https://sourceforge.net/p/minidlna/bugs/364/, the source code at https://sourceforge.net/p/minidlna/git/ci/master/tree/minidlna.c, and the project page at https://sourceforge.net/projects/minidlna/. Security practitioners should review these for updates, configuration hardening, or alternative implementations.

Details

CWE(s)
CWE-77

References