Vulnerabilities (CVE)

Filtered by vendor Terra-master Subscribe
Filtered by product F4-210
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-45839 1 Terra-master 3 F2-210, F4-210, Tos 2023-12-10 4.0 MEDIUM 6.5 MEDIUM
It is possible to obtain the first administrator's hash set up on the system in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) as well as other information such as MAC address, internal IP address etc. by performing a request to the /module/api.php?mobile/webNasIPS endpoint.
CVE-2021-45836 1 Terra-master 3 F2-210, F4-210, Tos 2023-12-10 9.0 HIGH 8.8 HIGH
An authenticated attacker can execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by injecting a maliciously crafted input in the request through /tos/index.php?app/hand_app.
CVE-2021-45841 1 Terra-master 3 F2-210, F4-210, Tos 2023-12-10 6.8 MEDIUM 8.1 HIGH
In Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517), an attacker can self-sign session cookies by knowing the target's MAC address and the user's password hash. Guest users (disabled by default) can be abused using a null/empty hash and allow an unauthenticated attacker to login as guest.
CVE-2021-45837 1 Terra-master 3 F2-210, F4-210, Tos 2023-12-10 10.0 HIGH 9.8 CRITICAL
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending a specifically crafted input to /tos/index.php?app/del.
CVE-2021-45840 1 Terra-master 3 F2-210, F4-210, Tos 2023-12-10 10.0 HIGH 9.8 CRITICAL
It is possible to execute arbitrary commands as root in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) by sending specifically crafted input to /tos/index.php?app/app_start_stop.
CVE-2021-45842 1 Terra-master 3 F2-210, F4-210, Tos 2023-12-10 5.0 MEDIUM 7.5 HIGH
It is possible to obtain the first administrator's hash set up in Terramaster F4-210, F2-210 TOS 4.2.X (4.2.15-2107141517) on the system as well as other information such as MAC address, internal IP address etc. by performing a request to the /module/api.php?mobile/wapNasIPS endpoint.