Critical vulnerabilities discovered in various NAS Devices such as WD My Book, NetGear Stora, Seagate Home, Medion LifeCloud NAS allows attackers to exploit it remotely without any user interaction.
Network Storage Systems (NAS) devices are very essential for small and Medium Business and it helps to increase the storage when you’re running out of the disk space.
New research conducted by security researchers Paulos Yibelo and Daniel Eshetu on leading NAS devices and find some of the critical vulnerabilities.
These Vulnerabilities could allow attackers to exploit the devices remotely without any user interaction and gain the highest privileges on the vulnerable system.
There are 2 (dubbed CVE-2018-18472 & CVE-2018-18471) critical Zero-day vulnerabilities addressed in this researcher that affected following 4 four popular NAS devices
These Vulnerabilities allows hackers are skilled experts to gain the some of the sensitive privileges such as read files, add/remove users, add/modify existing data, or execute commands on all the above devices.
All four NAS devices tested suffer from a zero-day unauthenticated root remote command execution (preauth RCE) vulnerabilities and there are nearly 2 million affected devices online.
Researchers believe that there are many other NAS devices that suffer from similar vulnerabilities as there seems to be a missing pattern of expected from NAS devices.
Axentra Hipserv is a NAS based operating system that provides cloud-based login access and file storage that is used in different product vendors such as Netgear Stora, Seagate GoFlex Home, Medion LifeCloud.
In this case, the company provides a firmware with a web interface that mainly uses PHP as a serverside language. The web interface has a REST API endpoint and a typical web management interface with a file manager support.
According to wizcase, A vulnerability discovered in this web interface opened the endpoint to exploitation that allows to read files and perform SSRF attacks and you can read the technical details here.
WD MyCloud contains a remotely exploitable Vulnerability in WD MyBook Live that allows Unauthenticated Remote Command Execution.
It allows let attackers run commands on the device as root that vulnerability exists in the language change and modify functionality in the REST API.
Researchers advise all the users from following the steps to prevent from these vulnerabilities.
Also Read:
Gunra Ransomware, has surfaced as a formidable threat in April 2025, targeting Windows systems across…
Cybersecurity firm Sansec has uncovered a sophisticated supply chain attack that has compromised 21 popular…
The financially motivated threat group Venom Spider, also tracked as TA4557, has shifted its focus…
The Russian-based threat group RomCom, also known as Storm-0978, Tropical Scorpius, and Void Rabisu, has…
The Seqrite Labs APT team has uncovered a sophisticated cyber campaign by the Pakistan-linked Transparent…
The LUMMAC.V2 infostealer malware, also known as Lumma or Lummastealer, has emerged as a significant…