vendor:
TeraStation TS-Series
by:
Andrea Fabrizi
9,8
CVSS
HIGH
Arbitrary File Download and Command Injection
20, 78
CWE
Product Name: TeraStation TS-Series
Affected Version From: firmware version <= 1.5.7
Affected Version To: firmware version <= 1.5.7
Patch Exists: NO
Related CWE: None
CPE: o:buffalo:terastation_ts-series
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux ARM
2020
Buffalo TeraStation TS-Series multiple vulnerabilities
Requesting an unprotected cgi, it's possible, for an unauthenticated user, to download any system file, included /etc/shadow, that contains the password shadows for the application/system users. Moreover, using the key 'all' it's possible to download the entire /var/log directory. This vulnerability also allows authenticated users to execute arbitrary commands on the system with root privileges.
Mitigation:
Update the firmware to the latest version.