Show filters
47 Total Results
Displaying 1-10 of 47
Sort by:
Attacker Value
Very High

CVE-2022-24990

Disclosure Date: February 07, 2023 (last updated October 08, 2023)
TerraMaster NAS 4.2.29 and earlier allows remote attackers to discover the administrative password by sending "User-Agent: TNAS" to module/api.php?mobile/webNasIPS and then reading the PWD field in the response.
Attacker Value
Very High

CVE-2020-28188

Disclosure Date: December 24, 2020 (last updated February 22, 2025)
Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter.
Attacker Value
Very High

CVE-2021-45837

Disclosure Date: April 25, 2022 (last updated October 07, 2023)
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending a specifically crafted input to /tos/index.php?app/del.
Attacker Value
Very High

CVE-2020-35665

Disclosure Date: December 23, 2020 (last updated February 22, 2025)
An unauthenticated command-execution vulnerability exists in TerraMaster TOS through 4.2.06 via shell metacharacters in the Event parameter in include/makecvs.php during CSV creation.
Attacker Value
Unknown

CVE-2020-15568

Disclosure Date: January 30, 2021 (last updated February 22, 2025)
TerraMaster TOS before 4.1.29 has Invalid Parameter Checking that leads to code injection as root. This is a dynamic class method invocation vulnerability in include/exportUser.php, in which an attacker can trigger a call to the exec method with (for example) OS commands in the opt parameter.
Attacker Value
Unknown

CVE-2022-24989

Disclosure Date: August 20, 2023 (last updated October 08, 2023)
TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used.
Attacker Value
Unknown

CVE-2021-45842

Disclosure Date: April 25, 2022 (last updated October 07, 2023)
It is possible to obtain the first administrator's hash set up in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) on the system as well as other information such as MAC address, internal IP address etc. by performing a request to the /module/api.php?mobile/wapNasIPS endpoint.
Attacker Value
Unknown

CVE-2021-45841

Disclosure Date: April 25, 2022 (last updated October 07, 2023)
In Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517), an attacker can self-sign session cookies by knowing the target's MAC address and the user's password hash. Guest users (disabled by default) can be abused using a null/empty hash and allow an unauthenticated attacker to login as guest.
Attacker Value
Unknown

CVE-2021-45840

Disclosure Date: April 25, 2022 (last updated October 07, 2023)
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending specifically crafted input to /tos/index.php?app/app_start_stop.
Attacker Value
Unknown

CVE-2021-45839

Disclosure Date: April 25, 2022 (last updated October 07, 2023)
It is possible to obtain the first administrator's hash set up on the system in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) as well as other information such as MAC address, internal IP address etc. by performing a request to the /module/api.php?mobile/webNasIPS endpoint.