In Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517), an attacker can self-sign session cookies by knowing the target's MAC address and the user's password hash. Guest users (disabled by default) can be abused using a null/empty hash and allow an unauthenticated attacker to login as guest.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html | |
https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-04-25 11:15
Updated : 2023-08-08 14:22
NVD link : CVE-2021-45841
Mitre link : CVE-2021-45841
CVE.ORG link : CVE-2021-45841
JSON object : View
Products Affected
terra-master
- f4-210
- tos
- f2-210