CVE-2025-69430

6.1 MEDIUM

📋 TL;DR

An incorrect symlink follow vulnerability in Yottamaster NAS devices allows attackers with physical USB drive access to read and modify the NAS internal file system. By creating a symbolic link on a USB drive and mounting it on the NAS, attackers can bypass intended access controls. This affects DM2, DM3, and DM200 NAS devices running vulnerable firmware versions.

💻 Affected Systems

Products:
  • Yottamaster DM2
  • Yottamaster DM3
  • Yottamaster DM200
Versions: DM2 and DM3: V1.9.12 and prior; DM200: V1.2.23 and prior
Operating Systems: Yottamaster NAS firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with default configurations are vulnerable. Requires physical USB port access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of NAS file system including sensitive data theft, file tampering, malware installation, and potential lateral movement to connected systems.

🟠

Likely Case

Unauthorized access to sensitive files stored on the NAS, data exfiltration, and potential file corruption or deletion.

🟢

If Mitigated

Limited impact if USB ports are physically secured and access controls prevent unauthorized physical access to devices.

🌐 Internet-Facing: LOW - This requires physical USB drive access to the NAS device.
🏢 Internal Only: HIGH - Any attacker with physical access to the NAS USB port can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access to insert a specially prepared USB drive. No authentication or network access needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.notion.so/Yottamaster-Incorrect-Symlink-Follow-2c36cf4e528a8001b37cdad4be7431f8?source=copy_link

Restart Required: No

Instructions:

1. Monitor Yottamaster website for firmware updates. 2. Check current firmware version. 3. Apply any available updates following vendor instructions.

🔧 Temporary Workarounds

Disable USB Ports

all

Physically disable or restrict access to USB ports on NAS devices

Physical Security Controls

all

Implement physical security measures to prevent unauthorized USB device insertion

🧯 If You Can't Patch

  • Implement strict physical access controls to NAS devices
  • Disconnect or physically secure USB ports using port locks or epoxy

🔍 How to Verify

Check if Vulnerable:

Check NAS firmware version via web interface or device display. If version is DM2/DM3 ≤ V1.9.12 or DM200 ≤ V1.2.23, device is vulnerable.

Check Version:

Check via NAS web interface or device display (vendor-specific)

Verify Fix Applied:

Verify firmware version has been updated beyond vulnerable versions. No specific test available without attempting exploitation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual USB device insertion logs
  • File access patterns from USB mount points

Network Indicators:

  • Unusual file transfer activity from NAS

SIEM Query:

source="nas_logs" AND (event="usb_insert" OR event="mount") AND device_type="ext4"

🔗 References

📤 Share & Export