Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zspace
Zspace q2c Nas |
|
| Vendors & Products |
Zspace
Zspace q2c Nas |
Mon, 08 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | ZSPACE Q2C NAS HTTP POST Request open zfilev2_api.OpenSafe command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-08T17:14:55.564Z
Reserved: 2025-12-05T14:52:23.206Z
Link: CVE-2025-14108
Updated: 2025-12-08T17:08:24.168Z
Status : Awaiting Analysis
Published: 2025-12-05T22:15:49.383
Modified: 2025-12-08T18:26:49.133
Link: CVE-2025-14108
No data.
OpenCVE Enrichment
Updated: 2025-12-08T09:39:52Z