Lucene search

K
zdiTeam ECQZDI-24-823
HistoryJun 21, 2024 - 12:00 a.m.

(Pwn2Own) QNAP TS-464 TURN Server create_session Server-Side Request Forgery Vulnerability

2024-06-2100:00:00
Team ECQ
www.zerodayinitiative.com
4
pwn2own
qnap ts-464
server-side request forgery
vulnerability
remote attackers
authentication
arbitrary code
nas devices
uri validation
root context

AI Score

7.1

Confidence

High

This vulnerability allows remote attackers to execute arbitrary code on affected installations of QNAP TS-464 NAS devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the create_session action. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

AI Score

7.1

Confidence

High

Related for ZDI-24-823