CVE-2013-10049
Raidsonic NAS - Command Injection
Title source: llmDescription
An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/28508
metasploit
WORKING POC
MANUAL
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/raidsonic_nas_ib5220_exec_noauth.rb
References (5)
Scores
EPSS
0.5137
EPSS Percentile
97.8%
Classification
CWE
CWE-78
Status
draft
Timeline
Published
Aug 01, 2025
Tracked Since
Feb 18, 2026