Metrics
Affected Vendors & Products
No advisories yet.
Solution
The vendor provides a firmware update to version 7.42, which can be downloaded via the vendor's customer server portal.
Workaround
No workaround given by the vendor.
Mon, 03 Nov 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 20 Dec 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 10 Dec 2024 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data". | |
| Title | OS Command Execution through Arbitrary File Upload | |
| Weaknesses | CWE-434 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T22:21:57.517Z
Reserved: 2024-10-07T13:39:52.543Z
Link: CVE-2024-47946
Updated: 2025-11-03T22:21:57.517Z
Status : Awaiting Analysis
Published: 2024-12-10T08:15:19.210
Modified: 2025-11-03T23:16:23.807
Link: CVE-2024-47946
No data.
OpenCVE Enrichment
No data.