CVE-2025-29845

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users to read .srt subtitle files on Synology Video Station systems. It affects Synology Video Station installations where users have authenticated access to the subtitle CGI functionality.

💻 Affected Systems

Products:
  • Synology Video Station
Versions: Video Station before version 3.2.0-5005
Operating Systems: Synology DSM (DiskStation Manager)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Video Station installed and subtitle CGI functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attackers could access sensitive subtitle files that might contain metadata or embedded information not intended for user viewing, potentially leading to information disclosure.

🟠

Likely Case

Limited information disclosure of subtitle file contents, which typically contain movie/TV show dialogue but could include embedded metadata or annotations.

🟢

If Mitigated

Minimal impact as subtitle files generally contain public dialogue text with limited sensitive information.

🌐 Internet-Facing: MEDIUM - If Video Station is exposed to the internet, authenticated users could exploit this vulnerability remotely.
🏢 Internal Only: LOW - Requires authenticated access, limiting impact to authorized users within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to the Video Station interface and knowledge of the subtitle CGI endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Video Station 3.2.0-5005 and later

Vendor Advisory: https://www.synology.com/en-global/security/advisory/Synology_SA_25_04

Restart Required: No

Instructions:

1. Log into DSM as administrator. 2. Open Package Center. 3. Find Video Station. 4. Click Update if available. 5. Install version 3.2.0-5005 or later.

🔧 Temporary Workarounds

Disable Video Station subtitle CGI

linux

Temporarily disable the subtitle CGI functionality until patching is possible

Restrict Video Station access

all

Limit Video Station access to trusted users only and remove unnecessary user accounts

🧯 If You Can't Patch

  • Remove Video Station from internet-facing interfaces and restrict to internal network only
  • Implement strict access controls and audit user accounts with Video Station permissions

🔍 How to Verify

Check if Vulnerable:

Check Video Station version in DSM Package Center. If version is below 3.2.0-5005, the system is vulnerable.

Check Version:

No direct command - check via DSM web interface Package Center

Verify Fix Applied:

Verify Video Station version shows 3.2.0-5005 or higher in Package Center.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to subtitle CGI endpoints
  • Multiple .srt file read requests from single user sessions

Network Indicators:

  • HTTP requests to /webapi/VideoStation/subtitle.cgi with file read parameters

SIEM Query:

source="synology" AND uri="/webapi/VideoStation/subtitle.cgi" AND (method="GET" OR method="POST") AND parameters CONTAINS ".srt"

🔗 References

📤 Share & Export