CVE-2023-53770
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-09

Assigner: VulnCheck

Description
MiniDVBLinux 5.4 contains an unauthenticated configuration download vulnerability that allows remote attackers to access sensitive system configuration files through a direct object reference. Attackers can exploit the backup download endpoint by sending a GET request with 'action=getconfig' to retrieve a complete system configuration archive containing sensitive credentials.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-09
Generated
2026-05-07
AI Q&A
2025-12-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
minidvblinux minidvblinux 5.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-260 The product stores a password in a configuration file that might be accessible to actors who do not know the password.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in MiniDVBLinux 5.4 allows remote attackers to download sensitive system configuration files without authentication by exploiting a backup download endpoint. By sending a GET request with 'action=getconfig', an attacker can retrieve a complete system configuration archive that contains sensitive credentials.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized access to sensitive system configuration data, including credentials. This can compromise system security, potentially allowing attackers to gain further access or control over the affected system.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending an unauthenticated HTTP GET request to the vulnerable backup endpoint with the parameter 'action=getconfig'. For example, you can use the following curl command to test if the system is vulnerable: curl -v http://<target-ip>/tpl/setup/Backup/Edit backup/51_download_backup.sh?action=getconfig If the system responds with a compressed configuration archive, it is vulnerable. Extracting the archive will reveal sensitive configuration files such as /etc/passwd. Monitoring network traffic for such GET requests to the backup endpoint can also help detect exploitation attempts. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable backup endpoint by implementing authentication and access controls to prevent unauthenticated downloads. If possible, disable or restrict the backup download functionality until a patch or update is available. Network-level controls such as firewall rules can be used to block external access to the backup endpoint URL path. Monitoring and alerting on suspicious GET requests to the backup endpoint can also help detect exploitation attempts early. [1, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart