Loading
Generated remediation guidance and an executive summary. No account required.
TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.
Use CWE-74, Terra-Master vendor hub and Terramaster Operating System product page to widen CVE-2022-24989 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-24990, CVE-2020-35665 and CVE-2018-13354 for nearby disclosures in the same product family.