| タイトル | UGREEN DH2100+ NAS V4.2.0.601 Remote Command Execution |
|---|
| 説明 | A remote command execution vulnerability exists in the UGREEN DH2100+ NAS device. This vulnerability arises from a combination of arbitrary directory creation and command injection vulnerabilities. An attacker can send a specially crafted message to the /v1/file/backup/create endpoint, creating a uuid directory through directory traversal in the path field, and injecting malicious commands into the directory name (i.e., uuid name), thereby gaining ROOT control of the remote target NAS device. |
|---|
| ソース | ⚠️ https://www.notion.so/25e2b76e8e0c80578014fff04a950576 |
|---|
| ユーザー | Anonymous User |
|---|
| 送信 | 2025年11月20日 19:26 (5 月 ago) |
|---|
| モデレーション | 2025年12月06日 15:15 (16 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 334608 [UGREEN DH2100+ 迄 5.3.0.251125 nas_svr /v1/file/backup/create handler_file_backup_create path 特権昇格] |
|---|
| ポイント | 17 |
|---|