| 标题 | UGREEN DH2100+ NAS V4.2.0.601 Remote Command Execution |
|---|
| 描述 | A remote command execution vulnerability exists in the UGREEN DH2100+ NAS device. This vulnerability arises from a combination of arbitrary directory creation and command injection vulnerabilities. An attacker can send a specially crafted message to the /v1/file/backup/create endpoint, creating a uuid directory through directory traversal in the path field, and injecting malicious commands into the directory name (i.e., uuid name), thereby gaining ROOT control of the remote target NAS device. |
|---|
| 来源 | ⚠️ https://www.notion.so/25e2b76e8e0c80578014fff04a950576 |
|---|
| 用户 | Anonymous User |
|---|
| 提交 | 2025-11-20 19時26分 (5 月前) |
|---|
| 管理 | 2025-12-06 15時15分 (16 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 334608 [UGREEN DH2100+ 直到 5.3.0.251125 nas_svr /v1/file/backup/create handler_file_backup_create path 权限提升] |
|---|
| 积分 | 17 |
|---|