An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands.
Metrics
Affected Vendors & Products
References
History
Fri, 01 Aug 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands. | |
Title | Raidsonic NAS Devices Unauthenticated Remote Command Execution | |
Weaknesses | CWE-78 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-01T20:47:35.716Z
Updated: 2025-08-01T20:47:35.716Z
Reserved: 2025-08-01T14:37:40.294Z
Link: CVE-2013-10049

No data.

Status : Awaiting Analysis
Published: 2025-08-01T21:15:26.750
Modified: 2025-08-04T15:06:15.833
Link: CVE-2013-10049

No data.