CVE-2025-14183

4.3 MEDIUM

📋 TL;DR

This vulnerability in SGAI Space1 NAS devices allows remote attackers to retrieve stored credentials via unprotected API endpoints. It affects users of SGAI Space1 NAS N1211DS up to version 1.0.915, potentially exposing sensitive authentication data.

💻 Affected Systems

Products:
  • SGAI Space1 NAS N1211DS
Versions: Up to 1.0.915
Operating Systems: NAS-specific firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the gsaiagent component via the /cgi-bin/JSONAPI endpoint.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to the NAS, steal credentials, and compromise stored data or pivot to other systems.

🟠

Likely Case

Credential theft leading to data exposure or unauthorized access to the NAS.

🟢

If Mitigated

Limited impact if network segmentation and access controls prevent exploitation.

🌐 Internet-Facing: HIGH, as the exploit is remote and public, making internet-exposed devices prime targets.
🏢 Internal Only: MEDIUM, as internal attackers could exploit it if network access is available.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit is publicly available and can be launched remotely without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available; monitor vendor for updates and apply workarounds.

🔧 Temporary Workarounds

Block API Access

linux

Restrict network access to the /cgi-bin/JSONAPI endpoint using firewall rules.

iptables -A INPUT -p tcp --dport 80 -m string --string '/cgi-bin/JSONAPI' --algo bm -j DROP

Disable gsaiagent

linux

Stop or disable the gsaiagent service if not required.

systemctl stop gsaiagent
systemctl disable gsaiagent

🧯 If You Can't Patch

  • Isolate the NAS device on a segmented network to limit exposure.
  • Implement strict access controls and monitor for unauthorized API requests.

🔍 How to Verify

Check if Vulnerable:

Test if the /cgi-bin/JSONAPI endpoint responds to GET_FACTORY_INFO or GET_USER_INFO requests without authentication.

Check Version:

Check the NAS firmware version via the device's web interface or CLI.

Verify Fix Applied:

Verify that the endpoint no longer returns credential data or is inaccessible.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to /cgi-bin/JSONAPI endpoint in web server logs.

Network Indicators:

  • HTTP requests to GET_FACTORY_INFO or GET_USER_INFO from untrusted sources.

SIEM Query:

source="web_logs" AND uri="/cgi-bin/JSONAPI" AND (method="GET_FACTORY_INFO" OR method="GET_USER_INFO")

🔗 References

📤 Share & Export