Information

Vendor: ZSPACE

Affected products: Q2C NAS ≤ v1.1.0210050

Vendor Homepage: https://www.zspace.cn/

Vendor contact information: https://www.zspace.cn/about/ - kf@zspace.cn

image.png

Description

The ZSPACE Q2C NAS contains a vulnerability that allows for the leakage and modification of arbitrary files within the internal system. This vulnerability stems from lax checks on symbolic links within external USB devices. Attackers can create a symlink to its root directory, insert the drive into the NAS device's slot, and then access the USB drive's directory mounted on the NAS using Samba protocol. This allows them to obtain all files within the NAS system and tamper with those files.

Exploitation Process

Format the USB drive to ext4 format, and then create a symbolic link within it, such as sudo ln -s / rootdir, to create a symbolic link to the root directory.

image.png

Then insert the USB flash drive into the external USB slot of the NAS device, and for example, enable the Samba service to directly access all directories and files of the device's internal system.

image.png

Moreover, it's not just about leaking files and it's also possible to tamper with files inside the NAS system using the Samba service, because symbolic links will follow.

image.png

Afterwards, by checking this system file on the device, we can find that it has also been modified.

image.png

Credit

NASchecker