CVE-2025-14198

5.3 MEDIUM

📋 TL;DR

This vulnerability in Verysync 2.21.3 allows remote attackers to access sensitive information through the web administration module. The exploit targets the /safebrowsing/clientreport/download endpoint with a manipulated key parameter, enabling unauthorized data disclosure. All systems running the vulnerable version with web administration enabled are affected.

💻 Affected Systems

Products:
  • Verysync (微力同步)
Versions: 2.21.3
Operating Systems: All platforms running Verysync
Default Config Vulnerable: ⚠️ Yes
Notes: Requires web administration module to be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through disclosure of authentication tokens, configuration files, or sensitive user data leading to further attacks.

🟠

Likely Case

Exposure of sensitive information such as configuration details, user data, or internal system information that could facilitate additional attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit is publicly available and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider workarounds or alternative solutions.

🔧 Temporary Workarounds

Disable Web Administration

all

Turn off the web administration interface to prevent remote exploitation.

Edit Verysync configuration to disable web admin interface

Network Access Control

linux

Restrict access to Verysync web interface using firewall rules.

iptables -A INPUT -p tcp --dport [verysync_port] -s [trusted_ips] -j ACCEPT
iptables -A INPUT -p tcp --dport [verysync_port] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Verysync instances
  • Monitor for unusual access patterns to the /safebrowsing/clientreport/download endpoint

🔍 How to Verify

Check if Vulnerable:

Check if Verysync version is 2.21.3 and web admin is accessible. Test by accessing /safebrowsing/clientreport/download?key=dummytoken

Check Version:

Check Verysync configuration file or web interface for version information

Verify Fix Applied:

Verify web admin is disabled or inaccessible, or that the endpoint no longer returns sensitive information.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /safebrowsing/clientreport/download with unusual key parameters
  • Multiple failed or suspicious access attempts to web admin

Network Indicators:

  • Unusual traffic patterns to Verysync web port from untrusted sources
  • Requests with manipulated key parameters

SIEM Query:

source="verysync.log" AND (uri="/safebrowsing/clientreport/download" OR user_agent="exploit")

🔗 References

📤 Share & Export