CVE-2013-10049
Raidsonic NAS Devices Unauthenticated Remote Command Execution
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands.
| CWE | CWE-78 |
| Vendor | raidsonic technology gmbh |
| Product | ib-nas5220 |
| Published | Aug 1, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for raidsonic technology gmbh ib-nas5220
Be the first to know when new unknown vulnerabilities affecting raidsonic technology gmbh ib-nas5220 are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
Raidsonic Technology GmbH / IB-NAS5220
*
Raidsonic Technology GmbH / IB-NAS4220
*
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/raidsonic_nas_ib5220_exec_noauth.rb exploit-db.com: https://www.exploit-db.com/exploits/24499 exploit-db.com: https://www.exploit-db.com/exploits/28508 web.archive.org: https://web.archive.org/web/20160616174425/http://www.s3cur1ty.de/m1adv2013-010 vulncheck.com: https://www.vulncheck.com/advisories/raidsonic-nas-devices-unauth-rce
Credits
Michael Messner