CVE-2013-10049

Raidsonic NAS - Command Injection

Title source: llm

Description

An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/28508
exploitdb WORKING POC
by m-1-k-3 · textwebappshardware
https://www.exploit-db.com/exploits/24499
metasploit WORKING POC MANUAL
rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/raidsonic_nas_ib5220_exec_noauth.rb

Scores

EPSS 0.5137
EPSS Percentile 97.8%

Classification

CWE
CWE-78
Status draft

Timeline

Published Aug 01, 2025
Tracked Since Feb 18, 2026