CVE-2013-10049
CRITICALRaidsonic NAS - Command Injection
Title source: llmDescription
An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/28508
metasploit
WORKING POC
MANUAL
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/raidsonic_nas_ib5220_exec_noauth.rb
References (5)
Scores
CVSS v4
9.3
EPSS
0.5545
EPSS Percentile
98.1%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (2)
Raidsonic Technology GmbH/IB-NAS4220
Raidsonic Technology GmbH/IB-NAS5220
Published
Aug 01, 2025
Tracked Since
Feb 18, 2026