If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data".
History

Mon, 03 Nov 2025 23:30:00 +0000

Type Values Removed Values Added
References

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00535}

epss

{'score': 0.00764}


Fri, 20 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Dec 2024 08:00:00 +0000

Type Values Removed Values Added
Description If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data".
Title OS Command Execution through Arbitrary File Upload
Weaknesses CWE-434
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published: 2024-12-10T07:48:42.166Z

Updated: 2025-11-03T22:21:57.517Z

Reserved: 2024-10-07T13:39:52.543Z

Link: CVE-2024-47946

cve-icon Vulnrichment

Updated: 2025-11-03T22:21:57.517Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-10T08:15:19.210

Modified: 2025-11-03T23:16:23.807

Link: CVE-2024-47946

cve-icon Redhat

No data.