Vulnerabilities summary in WiseGiga NAS devices
User controlled input is not sufficiently sanitized and can be exploit by an attacker to get sensitive information (for example, passwords). By sending GET request to the following URI’s with filename= as a parameter, an attacker can trigger the vulnerabilities. By sending GET request to /mobile/download_file2.php an attacker can trigger the vulnerability. The WiseGiga NAS firmware contain pre.php files in the different diretories. By sending GET request to the following URI’s with cmd= as a parameter, an attacker can trigger the vulnerability. The WiseGiga NAS firmware contain pre.php files in the different diretories. By sending POST request to the following URI’s with cmd= as a parameter, an attacker can trigger the vulnerability. The WiseGiga NAS firmware contain pre.php files in the different diretories. By sending GET request to the following URI’s with cmd= as a parameter, an attacker can trigger the vulnerability. The WiseGiga NAS firmware contain default accounts.