{ "Name": "Terramaster F4-210 Arbitrary File Read", "Description": "

TerraMaster F2-210 and F4-210 are NAS (Network Attached Storage) devices of Terramaster, Shenzhen, China.

TerraMaster F2-210 and F4-210 have arbitrary file reading vulnerabilities. Attackers can read arbitrary files and obtain sensitive information through sensitive information leaks and fake sessions.

", "Product": "TerraMaster F4-210", "Homepage": "https://www.terra-master.com/cn/", "DisclosureDate": "2022-01-04", "Author": "1291904552@qq.com", "FofaQuery": "title=\"TOS Loading\"", "GobyQuery": "title=\"TOS Loading\"", "Level": "2", "Impact": "

TerraMaster F2-210 and F4-210 have arbitrary file reading vulnerabilities. Attackers can read arbitrary files and obtain sensitive information through sensitive information leaks and fake sessions.

", "Recommendation": "

The vendor has released a bug fix, please pay attention to the update in time: https://www.terra-master.com/cn/

1. Set access policies and whitelist access through security devices such as firewalls.

2.If not necessary, prohibit public network access to the system.

", "Translation": { "CN": { "Name": "Terramaster 存储设备 F4-210 任意文件读取漏洞", "VulType": ["文件读取"], "Tags": ["文件读取"], "Description": "

TerraMaster F2-210和F4-210是中国深圳市图美电子技术(Terramaster)公司的NAS(网络附属存储)设备。

TerraMaster F2-210和F4-210存在任意文件读取漏洞,攻击者可通过敏感信息泄露伪造session来读取任意文件,获取敏感信息。

", "Impact": "

TerraMaster F2-210和F4-210存在任意文件读取漏洞,攻击者可通过敏感信息泄露伪造session来读取任意文件,获取敏感信息。

", "Product": "TerraMaster F4-210", "Recommendation": "

⼚商已发布了漏洞修复程序,请及时关注更新:https://www.terra-master.com/cn/

1、通过防⽕墙等安全设备设置访问策略,设置⽩名单访问。

2、如⾮必要,禁⽌公⽹访问该系统。

" }, "EN": { "Name": "Terramaster F4-210 Arbitrary File Read", "VulType": ["file-read"], "Tags": ["file-read"], "Description": "

TerraMaster F2-210 and F4-210 are NAS (Network Attached Storage) devices of Terramaster, Shenzhen, China.

TerraMaster F2-210 and F4-210 have arbitrary file reading vulnerabilities. Attackers can read arbitrary files and obtain sensitive information through sensitive information leaks and fake sessions.

", "Impact": "

TerraMaster F2-210 and F4-210 have arbitrary file reading vulnerabilities. Attackers can read arbitrary files and obtain sensitive information through sensitive information leaks and fake sessions.

", "Product": "TerraMaster F4-210", "Recommendation": "

The vendor has released a bug fix, please pay attention to the update in time: https://www.terra-master.com/cn/

1. Set access policies and whitelist access through security devices such as firewalls.

2.If not necessary, prohibit public network access to the system.

" } }, "References": [ "https://packetstormsecurity.com/files/165399/terramaster-exec.py.txt" ], "HasExp": true, "ExpParams": [ { "name": "filepath", "type": "input", "value": "/etc/passwd" } ], "ExpTips": null, "ScanSteps": null, "Tags": [ "file-read" ], "VulType": [ "file-read" ], "CVEIDs": [ "" ], "CVSSScore": "7.0", "AttackSurfaces": { "Application": null, "Support": null, "Service": null, "System": null, "Hardware": null }, "CNNVD": [ "" ], "CNVD": [ "" ] }