Description
TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.
Published: 2023-08-20
Score: 9.8 Critical
EPSS: 82.1% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 08 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:terra-master:terramaster_operating_system:-:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Terra-master F2-210 F2-221 F2-223 F2-422 F2-423 F4-421 F4-422 F4-423 F5-221 F5-422 T12-423 T12-450 T6-423 T9-423 T9-450 Terramaster Operating System U12-322-9100 U12-423 U12-722-2224 U16-322-9100 U16-722-2224 U24-722-2224 U4-111 U4-211 U4-423 U8-111 U8-322-9100 U8-423 U8-522-9400 U8-722-2224
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-08T14:30:47.504Z

Reserved: 2022-02-14T00:00:00.000Z

Link: CVE-2022-24989

cve-icon Vulnrichment

Updated: 2024-08-03T04:29:01.558Z

cve-icon NVD

Status : Modified

Published: 2023-08-20T18:15:09.523

Modified: 2024-11-21T06:51:31.063

Link: CVE-2022-24989

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses