Vulnerability Details : CVE-2021-45837
Public exploit exists!
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending a specifically crafted input to /tos/index.php?app/del.
Products affected by CVE-2021-45837
- cpe:2.3:o:terra-master:tos:4.2.15-2107141517:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-45837
80.77%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2021-45837
-
TerraMaster TOS 4.2.15 or lower - RCE chain from unauthenticated to root via session crafting.
Disclosure Date: 2021-12-24First seen: 2023-09-11exploit/linux/http/terramaster_unauth_rce_cve_2021_45837Terramaster chained exploit that performs session crafting to achieve escalated privileges that allows an attacker to access vulnerable code execution flaws. TOS versions 4.2.15 and below are affected. CVE-2021-45839 is exploited to obtain the first administrator's has
CVSS scores for CVE-2021-45837
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
References for CVE-2021-45837
-
http://packetstormsecurity.com/files/172881/TerraMaster-TOS-4.2.15-Remote-Code-Execution.html
TerraMaster TOS 4.2.15 Remote Code Execution ≈ Packet Storm
-
https://thatsn0tmy.site/posts/2021/12/how-to-summon-rces/
How to summon RCEs :: thatsn0tmysite — The life of a newbor cyber security kid.Exploit;Third Party Advisory
Jump to