CVE-2025-14199

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to upload arbitrary files to Verysync 微力同步 web administration interface without proper restrictions. Attackers can exploit this flaw to potentially upload malicious files and execute code on affected systems. All users running Verysync up to version 2.21.3 with web administration enabled are affected.

💻 Affected Systems

Products:
  • Verysync 微力同步
Versions: Up to 2.21.3
Operating Systems: All platforms running Verysync
Default Config Vulnerable: ⚠️ Yes
Notes: Requires web administration module to be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Unauthorized file upload allowing attackers to deploy web shells, deface websites, or establish persistence.

🟢

If Mitigated

Limited impact if proper network segmentation and file upload validation are implemented.

🌐 Internet-Facing: HIGH - Attack can be performed remotely and exploit is publicly available.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if web interface is accessible on internal network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub and vuldb.com, making this easily exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider upgrading to any version above 2.21.3 if available, or implement workarounds.

🔧 Temporary Workarounds

Disable Web Administration Interface

all

Disable the web administration module if not required for operations.

Edit Verysync configuration to disable web interface or block port access

Network Access Control

linux

Restrict access to Verysync web interface using firewall rules.

iptables -A INPUT -p tcp --dport [verysync_port] -s [trusted_ips] -j ACCEPT
iptables -A INPUT -p tcp --dport [verysync_port] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Verysync instances from critical systems
  • Deploy web application firewall (WAF) with file upload filtering rules

🔍 How to Verify

Check if Vulnerable:

Check Verysync version. If version is 2.21.3 or earlier, system is vulnerable. Test by attempting to upload a file to /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false endpoint.

Check Version:

Check Verysync configuration file or web interface for version information

Verify Fix Applied:

Verify web administration interface is disabled or inaccessible, or that file upload restrictions are properly implemented.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity to /rest/f/api/resources/ paths
  • Multiple failed or successful upload attempts from single IP

Network Indicators:

  • HTTP POST requests to /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false
  • Unusual outbound connections from Verysync server

SIEM Query:

source="verysync.log" AND (uri_path="/rest/f/api/resources/*" AND method="POST")

🔗 References

📤 Share & Export