CVE-2025-32002

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote unauthenticated attackers to execute arbitrary operating system commands on I-O DATA HDL-T Series network attached storage devices when the Remote Link3 function is enabled. Attackers can gain full control of affected devices, potentially accessing stored data, modifying configurations, or using the device as a foothold for further attacks. All users of HDL-T Series devices with firmware version 1.21 or earlier are affected.

💻 Affected Systems

Products:
  • I-O DATA HDL-T Series network attached hard disk
Versions: Firmware version 1.21 and earlier
Operating Systems: Embedded firmware
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when 'Remote Link3 function' is enabled. This feature may be disabled by default in some configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the NAS device leading to data theft, ransomware deployment, lateral movement into connected networks, and persistent backdoor installation.

🟠

Likely Case

Remote attackers execute commands to steal sensitive files, install cryptocurrency miners, or use the device as part of a botnet.

🟢

If Mitigated

If Remote Link3 function is disabled, the attack surface is significantly reduced, though other vulnerabilities might still exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

OS command injection vulnerabilities typically have low exploitation complexity, especially when unauthenticated. Given the high CVSS score and public disclosure, weaponization is likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version newer than 1.21

Vendor Advisory: https://www.iodata.jp/support/information/2025/05_hdl-t/

Restart Required: Yes

Instructions:

1. Download latest firmware from I-O DATA support site. 2. Backup all data. 3. Apply firmware update through device web interface. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Disable Remote Link3 Function

all

Disable the vulnerable Remote Link3 feature to prevent exploitation

Network Segmentation

all

Isolate HDL-T devices from internet and restrict access to trusted networks only

🧯 If You Can't Patch

  • Immediately disable Remote Link3 function in device settings
  • Block all external access to the device at network perimeter (firewall rules)

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in web admin interface. If version is 1.21 or earlier and Remote Link3 is enabled, device is vulnerable.

Check Version:

Check via web interface at http://[device-ip]/ or consult device documentation for CLI commands

Verify Fix Applied:

Verify firmware version is newer than 1.21 in device settings. Confirm Remote Link3 function remains disabled if not needed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Failed authentication attempts followed by command execution
  • Unexpected process creation

Network Indicators:

  • Unusual outbound connections from NAS device
  • Traffic to known malicious IPs or domains
  • Unexpected SSH or telnet connections

SIEM Query:

source="hdl-t-logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*")

🔗 References

📤 Share & Export