Information

Vendor: UGREEN

Affected products: DH2100+ NAS ≤ V5.3.0

Vendor Homepage: https://www.ugnas.com

Vendor contact information: https://www.ugnas.com/contact - nasjishu@ugreen.com

image.png

Description

A vulnerability exists in the UGREEN NAS device DH2100+ (version V5.3.0 or lower) that allows for the leakage and modification of arbitrary files within the internal system. This vulnerability stems from lax checks on symbolic links within external USB devices. An attacker could create symbolic links to arbitrary files on a USB device and insert them into the NAS device, thereby gaining access to or modifying the corresponding files within the NAS system through the UGREEN NAS client.

Exploitation Process

First, prepare a USB device and format it as ext4. Then, create symbolic links for any file type on the USB drive (for example, /etc/passwd and /etc/shadow).

image.png

Then, by plugging the USB device into the NAS, the contents of the corresponding files inside the NAS system can be obtained through the UGREEN NAS APP (such as leaking all user files and system files stored inside the NAS), and the corresponding files can also be tampered with (for example, by adding malicious commands to a startup script).

image.png

For example, this could expose the passwd and shadow files inside the NAS system, or allow for their tampering or forgery.

image.png

image.png

image.png

Credit

NASchecker