It is possible to obtain the first administrator's hash set up on the system in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) as well as other information such as MAC address, internal IP address etc. by performing a request to the /module/api.php?mobile/webNasIPS endpoint.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html | |
https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/ | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html | |
https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html - | |
References | () https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/ - Exploit, Third Party Advisory |
12 Jun 2023, 07:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-04-25 11:15
Updated : 2024-11-21 06:33
NVD link : CVE-2021-45839
Mitre link : CVE-2021-45839
CVE.ORG link : CVE-2021-45839
JSON object : View
Products Affected
terra-master
- tos
- f2-210
- f4-210
CWE