Show filters
14 Total Results
Displaying 11-14 of 14
Sort by:
Attacker Value
Unknown
CVE-2024-28140
Disclosure Date: December 11, 2024 (last updated December 21, 2024)
The scanner device boots into a kiosk mode by default and opens the Scan2Net interface in a browser window. This browser is run with the permissions of the root user. There are also several other applications running as root user. This can be confirmed by running "ps aux" as the root user and observing the output.
0
Attacker Value
Unknown
CVE-2024-28139
Disclosure Date: December 11, 2024 (last updated December 21, 2024)
The www-data user can elevate its privileges because sudo is configured to allow the execution of the mount command as root without a password. Therefore, the privileges can be escalated to the root user. The risk has been accepted by the vendor and won't be fixed in the near future.
0
Attacker Value
Unknown
CVE-2024-47946
Disclosure Date: December 10, 2024 (last updated December 21, 2024)
If the attacker has access to a valid Poweruser session, remote code execution is possible because specially crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP code executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data".
0
Attacker Value
Unknown
CVE-2024-28138
Disclosure Date: December 10, 2024 (last updated December 21, 2024)
An unauthenticated attacker with network access to the affected device's web interface can execute any system command via the "msg_events.php" script as the www-data user. The HTTP GET parameter "data" is not properly sanitized.
0