Impact
The flaw resides in the get_csrf_whites function of /cgi/advanced/misc_main.cgi in the EFM ipTIME NAS1dual firmware version 1.5.24. Manipulating the request to this function causes a stack‑based buffer overflow. Such an overflow could enable an attacker to overwrite return addresses and execute arbitrary code, or to trigger a crash that disrupts service. The vulnerability is triggered remotely, so any host with network reachability to the NAS is a potential target.
Affected Systems
The affected device is the EFM ipTIME NAS1dual running firmware 1.5.24. No other versions or products are listed as affected in the current CNA data.
Risk and Exploitability
The CVSS score of 9.3 signals a critical severity. EPSS data is not available, but the vulnerability has been publicly disclosed and can be exploited remotely. The defect is not included in the CISA KEV catalog yet, but the existence of a public exploit indicates a realistic risk. Attackers can target the NAS through the exposed /cgi/advanced/misc_main.cgi endpoint, and without an official fix the exposure remains high.
OpenCVE Enrichment