Lucene search

K
saintSAINT CorporationSAINT:EF113A24E0B0062CE40E33D9823E2C96
HistoryAug 30, 2016 - 12:00 a.m.

NETGEAR ReadyNAS Surveillance Command Execution

2016-08-3000:00:00
SAINT Corporation
download.saintcorporation.com
69

0.958 High

EPSS

Percentile

99.5%

Added: 08/30/2016
CVE: CVE-2016-5674
BID: 92318

Background

NETGEAR ReadyNAS Surveillance combines their storage and switching solution (NETGEAR ReadyNAS Network Attached Storage system) with network video recording software from NUUO to provide an affordable surveillance solution for small businesses.

Problem

The web inteface used on NETGEAR ReadyNAS Surveillance contains a hidden file named __debugging_center_utils___.php that does not properly sanitize user input before passing it to the PHP system() call. Successful exploit results in command execution as the admin user.

Resolution

Contact the vendor for a software upgrade or find a different solution.

References

<https://www.exploit-db.com/exploits/40200/&gt;

Limitations

Exploit works on NETGEAR ReadyNAS Surveillance v1.1.1 to v1.4.1.

Platforms

Linux