Description
TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Tue, 08 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:terra-master:terramaster_operating_system:-:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Subscriptions
Terra-master
Subscribe
F2-210
Subscribe
F2-221
Subscribe
F2-223
Subscribe
F2-422
Subscribe
F2-423
Subscribe
F4-421
Subscribe
F4-422
Subscribe
F4-423
Subscribe
F5-221
Subscribe
F5-422
Subscribe
T12-423
Subscribe
T12-450
Subscribe
T6-423
Subscribe
T9-423
Subscribe
T9-450
Subscribe
Terramaster Operating System
Subscribe
U12-322-9100
Subscribe
U12-423
Subscribe
U12-722-2224
Subscribe
U16-322-9100
Subscribe
U16-722-2224
Subscribe
U24-722-2224
Subscribe
U4-111
Subscribe
U4-211
Subscribe
U4-423
Subscribe
U8-111
Subscribe
U8-322-9100
Subscribe
U8-423
Subscribe
U8-522-9400
Subscribe
U8-722-2224
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-08T14:30:47.504Z
Reserved: 2022-02-14T00:00:00.000Z
Link: CVE-2022-24989
Updated: 2024-08-03T04:29:01.558Z
Status : Modified
Published: 2023-08-20T18:15:09.523
Modified: 2024-11-21T06:51:31.063
Link: CVE-2022-24989
No data.
OpenCVE Enrichment
No data.
Weaknesses