A remote code execution (RCE) vulnerability in the component /admin/store.php of Emlog Pro before v2.3.15 allows attackers to use remote file downloads and self-extract fucntions to upload webshells to the target server, thereby obtaining system privileges.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://gist.github.com/microvorld/1c1ef9c3390a5d88a5ede9f9424a8bd2 | Third Party Advisory |
https://github.com/emlog/emlog | Product |
https://github.com/microvorld/CVE-2024/blob/main/emlog.md | Exploit Third Party Advisory |
Configurations
History
17 Jun 2025, 15:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Emlog emlog
Emlog |
|
CPE | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* | |
References | () https://gist.github.com/microvorld/1c1ef9c3390a5d88a5ede9f9424a8bd2 - Third Party Advisory | |
References | () https://github.com/microvorld/CVE-2024/blob/main/emlog.md - Exploit, Third Party Advisory | |
References | () https://github.com/emlog/emlog - Product |
30 Sep 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-30 17:15
Updated : 2025-06-17 15:57
NVD link : CVE-2024-46540
Mitre link : CVE-2024-46540
JSON object : View
Products Affected
emlog
- emlog
CWE
No CWE.