Today > 8 Critical | 28 High | 32 Medium vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-47946

Dec. 10, 2024, 8:15 a.m.

Description

If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data".

Weaknesses

CWE-434
Unrestricted Upload of File with Dangerous Type

The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

CWE ID: 434

Date

Published: Dec. 10, 2024, 8:15 a.m.

Last Modified: Dec. 10, 2024, 8:15 a.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

551230f0-3615-47bd-b7cc-93e92e730bbf

References

https://r.sec-consult.com/ 551230f0-3615-47bd-b7cc-93e92e730bbf

https://www.imageaccess.de/ 551230f0-3615-47bd-b7cc-93e92e730bbf