TerraMaster NAS 4.2.29 and earlier allows remote attackers to discover the administrative password by sending "User-Agent: TNAS" to module/api.php?mobile/webNasIPS and then reading the PWD field in the response.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://forum.terra-master.com/en/viewforum.php?f=28 | issue tracking release notes |
https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=33732 | third party advisory |
https://github.com/0xf4n9x/CVE-2022-24990 | third party advisory exploit |
https://octagon.net/blog/2022/03/07/cve-2022-24990-terrmaster-tos-unauthenticated-remote-command-execution-via-php-object-instantiation/ | third party advisory exploit |
http://packetstormsecurity.com/files/172904/TerraMaster-TOS-4.2.29-Remote-Code-Execution.html | exploit vdb entry third party advisory |