CVE-2025-14188

7.2 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in UGREEN DH2100+ NAS devices that allows remote attackers to execute arbitrary commands on affected systems. The vulnerability exists in the backup creation function and can be exploited without authentication. All users running affected versions of UGREEN DH2100+ NAS devices are at risk.

💻 Affected Systems

Products:
  • UGREEN DH2100+
Versions: Up to version 5.3.0.251125
Operating Systems: NAS firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the nas_svr component specifically in the backup creation endpoint.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal data, pivot to internal networks, or render the NAS device unusable.

🟠

Likely Case

Data theft, ransomware deployment, or use as a foothold for lateral movement within the network.

🟢

If Mitigated

Limited impact if network segmentation isolates the NAS device and strict access controls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit disclosure increases likelihood of weaponization. Remote exploitation without authentication makes this particularly dangerous.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 5.3.0.251125

Vendor Advisory: Not provided in references

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Access UGREEN NAS web interface. 3. Navigate to System Update section. 4. Install latest available firmware update. 5. Reboot the NAS device.

🔧 Temporary Workarounds

Disable remote access

all

Block external access to the NAS device to prevent remote exploitation

Configure firewall to block port 80/443 access from external networks

Restrict backup functionality

all

Disable or restrict access to the vulnerable backup endpoint

Use NAS access controls to disable /v1/file/backup/create endpoint if possible

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the NAS device from critical systems
  • Deploy web application firewall (WAF) rules to block command injection patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version in NAS web interface under System Information

Check Version:

Check via web interface or SSH if enabled: cat /etc/version

Verify Fix Applied:

Verify firmware version is greater than 5.3.0.251125

📡 Detection & Monitoring

Log Indicators:

  • Unusual commands in system logs
  • Multiple failed backup attempts
  • Suspicious process execution

Network Indicators:

  • Unusual outbound connections from NAS device
  • Traffic to /v1/file/backup/create with suspicious parameters

SIEM Query:

source="nas_logs" AND (url="/v1/file/backup/create" OR command="*;*" OR command="*|*")

🔗 References

📤 Share & Export