Описание
TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.
Ссылки
- Third Party Advisory
- Release Notes
- Exploit
- Exploit
- ExploitThird Party AdvisoryVDB Entry
- Third Party Advisory
- Release Notes
- Exploit
- Exploit
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Одновременно
Одно из
EPSS
9.8 Critical
CVSS3
Дефекты
Связанные уязвимости
TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.
EPSS
9.8 Critical
CVSS3