An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 01 Aug 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands. | |
| Title | Raidsonic NAS Devices Unauthenticated Remote Command Execution | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-01T20:47:35.716Z
Updated: 2025-08-06T14:49:43.328Z
Reserved: 2025-08-01T14:37:40.294Z
Link: CVE-2013-10049
Updated: 2025-08-06T14:49:33.190Z
Status : Awaiting Analysis
Published: 2025-08-01T21:15:26.750
Modified: 2025-08-06T15:15:30.450
Link: CVE-2013-10049
No data.