Описание
This vulnerability occured by sending a malicious POST request to a specific page while logged in random user from some family of IPTIME NAS. Remote attackers can steal root privileges by changing the password of the root through a POST request.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.4.86 (исключая)
Одновременно
cpe:2.3:o:iptime:nas1dual_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:iptime:nas1dual:-:*:*:*:*:*:*:*
Конфигурация 2Версия до 1.4.86 (исключая)
Одновременно
cpe:2.3:o:iptime:nas2dual_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:iptime:nas2dual:-:*:*:*:*:*:*:*
Конфигурация 3Версия до 1.4.86 (исключая)
Одновременно
cpe:2.3:o:iptime:nas4dual_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:iptime:nas4dual:-:*:*:*:*:*:*:*
EPSS
Процентиль: 44%
0.00219
Низкий
8 High
CVSS3
8.8 High
CVSS3
Дефекты
CWE-352
CWE-352
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
This vulnerability occured by sending a malicious POST request to a specific page while logged in random user from some family of IPTIME NAS. Remote attackers can steal root privileges by changing the password of the root through a POST request.
EPSS
Процентиль: 44%
0.00219
Низкий
8 High
CVSS3
8.8 High
CVSS3
Дефекты
CWE-352
CWE-352