CVE-2025-14197

5.3 MEDIUM

📋 TL;DR

An information disclosure vulnerability in Verysync's web administration module allows remote attackers to access sensitive data via a specific API endpoint. This affects all Verysync installations up to version 2.21.3 with the web interface enabled. The vulnerability exposes potentially sensitive system or configuration information to unauthorized parties.

💻 Affected Systems

Products:
  • Verysync (微力同步)
Versions: Up to and including 2.21.3
Operating Systems: All platforms running Verysync
Default Config Vulnerable: ⚠️ Yes
Notes: Affects installations with web administration module enabled (default configuration).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain sensitive configuration data, authentication tokens, or system information that could enable further attacks or data exfiltration.

🟠

Likely Case

Unauthorized access to internal system information, configuration details, or limited sensitive data through the exposed API endpoint.

🟢

If Mitigated

Information exposure limited to non-critical data if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details publicly available on GitHub. Simple HTTP request to vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider workarounds or alternative software.

🔧 Temporary Workarounds

Disable Web Administration Interface

all

Disable the vulnerable web administration module if not required

Edit Verysync configuration to disable web interface or set bind address to localhost only

Network Access Control

linux

Restrict access to Verysync web interface using firewall rules

iptables -A INPUT -p tcp --dport [VERYSYNC_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [VERYSYNC_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Verysync instances
  • Deploy web application firewall (WAF) to block requests to vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Test if /rest/f/api/resources/f96956469e7be39d endpoint returns sensitive information without authentication

Check Version:

Check Verysync version in web interface or configuration files

Verify Fix Applied:

Verify endpoint no longer returns sensitive data or returns proper authentication error

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /rest/f/api/resources/f96956469e7be39d
  • Unusual access patterns to web administration interface

Network Indicators:

  • HTTP GET requests to vulnerable endpoint from untrusted sources

SIEM Query:

web.url = "*/rest/f/api/resources/f96956469e7be39d*"

🔗 References

📤 Share & Export