| Título | UGREEN DH2100+ NAS V4.2.0.601 Remote Command Execution |
|---|
| Descripción | A remote command execution vulnerability exists in the UGREEN DH2100+ NAS device. This vulnerability arises from a combination of arbitrary directory creation and command injection vulnerabilities. An attacker can send a specially crafted message to the /v1/file/backup/create endpoint, creating a uuid directory through directory traversal in the path field, and injecting malicious commands into the directory name (i.e., uuid name), thereby gaining ROOT control of the remote target NAS device. |
|---|
| Fuente | ⚠️ https://www.notion.so/25e2b76e8e0c80578014fff04a950576 |
|---|
| Usuario | Anonymous User |
|---|
| Sumisión | 2025-11-20 19:26 (hace 5 meses) |
|---|
| Moderación | 2025-12-06 15:15 (16 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 334608 [UGREEN DH2100+ hasta 5.3.0.251125 nas_svr /v1/file/backup/create handler_file_backup_create path escalada de privilegios] |
|---|
| Puntos | 17 |
|---|