TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Terra-master
Subscribe
|
F2-210
Subscribe
F2-221
Subscribe
F2-223
Subscribe
F2-422
Subscribe
F2-423
Subscribe
F4-421
Subscribe
F4-422
Subscribe
F4-423
Subscribe
F5-221
Subscribe
F5-422
Subscribe
T12-423
Subscribe
T12-450
Subscribe
T6-423
Subscribe
T9-423
Subscribe
T9-450
Subscribe
Terramaster Operating System
Subscribe
U12-322-9100
Subscribe
U12-423
Subscribe
U12-722-2224
Subscribe
U16-322-9100
Subscribe
U16-722-2224
Subscribe
U24-722-2224
Subscribe
U4-111
Subscribe
U4-211
Subscribe
U4-423
Subscribe
U8-111
Subscribe
U8-322-9100
Subscribe
U8-423
Subscribe
U8-522-9400
Subscribe
U8-722-2224
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 08 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:terra-master:terramaster_operating_system:-:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-08T14:30:47.504Z
Reserved: 2022-02-14T00:00:00
Link: CVE-2022-24989
Updated: 2024-08-03T04:29:01.558Z
Status : Modified
Published: 2023-08-20T18:15:09.523
Modified: 2024-11-21T06:51:31.063
Link: CVE-2022-24989
No data.
OpenCVE Enrichment
No data.
Weaknesses