CVE-2013-10049

CRITICAL

Raidsonic NAS - Command Injection

Title source: llm

Description

An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/28508
exploitdb WORKING POC
by m-1-k-3 · textwebappshardware
https://www.exploit-db.com/exploits/24499
metasploit WORKING POC MANUAL
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/raidsonic_nas_ib5220_exec_noauth.rb

Scores

CVSS v4 9.3
EPSS 0.5545
EPSS Percentile 98.1%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-78
Status published
Products (2)
Raidsonic Technology GmbH/IB-NAS4220
Raidsonic Technology GmbH/IB-NAS5220
Published Aug 01, 2025
Tracked Since Feb 18, 2026