If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data".
Metrics
Affected Vendors & Products
References
History
Fri, 20 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 10 Dec 2024 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data". | |
Title | OS Command Execution through Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2024-12-20T20:53:35.656Z
Reserved: 2024-10-07T13:39:52.543Z
Link: CVE-2024-47946

Updated: 2024-12-20T20:53:29.676Z

Status : Awaiting Analysis
Published: 2024-12-10T08:15:19.210
Modified: 2024-12-20T21:15:08.473
Link: CVE-2024-47946

No data.