CVE-2025-14187
📋 TL;DR
A buffer overflow vulnerability in UGREEN DH2100+ NAS devices allows remote attackers to execute arbitrary code by manipulating the 'path' parameter in the backup creation function. This affects all users running nas_svr component versions up to 5.3.0.251125. Successful exploitation could lead to complete system compromise.
💻 Affected Systems
- UGREEN DH2100+
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, ransomware deployment, or device becoming part of botnet
Likely Case
Remote code execution allowing attacker to gain shell access, install malware, or pivot to internal network
If Mitigated
Attack blocked at network perimeter or device isolated, preventing exploitation
🎯 Exploit Status
Exploit has been made publicly available according to references, making attacks more likely
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 5.3.0.251125
Vendor Advisory: Not provided in references
Restart Required: Yes
Instructions:
1. Log into UGREEN NAS admin interface
2. Navigate to System Settings > Firmware Update
3. Check for and apply latest firmware update
4. Reboot device after update completes
🔧 Temporary Workarounds
Disable remote backup functionality
allTemporarily disable the vulnerable backup creation endpoint
Network segmentation
allIsolate NAS device from internet and restrict internal access
🧯 If You Can't Patch
- Immediately isolate device from internet and restrict to necessary internal access only
- Implement strict network monitoring and IDS/IPS rules for suspicious traffic to NAS
🔍 How to Verify
Check if Vulnerable:
Check firmware version in NAS admin interface under System Information
Check Version:
Check via web interface: System Settings > Firmware Information
Verify Fix Applied:
Confirm firmware version is greater than 5.3.0.251125
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /v1/file/backup/create with long path parameters
- Multiple failed backup creation attempts
- Unexpected process execution or system reboots
Network Indicators:
- Unusual outbound connections from NAS device
- Traffic patterns suggesting reverse shells
- Exploit kit traffic to NAS IP
SIEM Query:
source="nas_logs" AND (uri="/v1/file/backup/create" AND (path_length>100 OR contains(path,"..")))