CVE-2024-55371

Wallos <= 2.38.2 has a file upload vulnerability in the restore backup function, which allows authenticated users to restore backups by uploading a ZIP file. The contents of the ZIP file are extracted on the server. This functionality enables an authenticated attacker (being an administrator is not required) to upload malicious files to the server. Once a web shell is installed, the attacker gains the ability to execute arbitrary commands.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*

History

03 Jun 2025, 15:00

Type Values Removed Values Added
CPE cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:*
First Time Wallosapp wallos
Wallosapp
References () https://www.datafarm.co.th/blog/CVE-2024-55371-and-CVE-2024-55372-Malicious-File-Upload-to-RCE-in-Wallos-ApplicationĀ - () https://www.datafarm.co.th/blog/CVE-2024-55371-and-CVE-2024-55372-Malicious-File-Upload-to-RCE-in-Wallos-ApplicationĀ - Exploit, Third Party Advisory

16 Apr 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 21:15

Updated : 2025-06-03 15:00


NVD link : CVE-2024-55371

Mitre link : CVE-2024-55371


JSON object : View

Products Affected

wallosapp

  • wallos
CWE

No CWE.