Description
TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.
Published: 2023-08-20
Score: 9.8 Critical
EPSS: 83.7% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 08 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:terra-master:terramaster_operating_system:-:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Terra-master F2-210 F2-221 F2-223 F2-422 F2-423 F4-421 F4-422 F4-423 F5-221 F5-422 T12-423 T12-450 T6-423 T9-423 T9-450 Terramaster Operating System U12-322-9100 U12-423 U12-722-2224 U16-322-9100 U16-722-2224 U24-722-2224 U4-111 U4-211 U4-423 U8-111 U8-322-9100 U8-423 U8-522-9400 U8-722-2224
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-08T14:30:47.504Z

Reserved: 2022-02-14T00:00:00.000Z

Link: CVE-2022-24989

cve-icon Vulnrichment

Updated: 2024-08-03T04:29:01.558Z

cve-icon NVD

Status : Modified

Published: 2023-08-20T18:15:09.523

Modified: 2024-11-21T06:51:31.063

Link: CVE-2022-24989

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses