🔐 CVE Alert

CVE-2013-10049

UNKNOWN 0.0

Raidsonic NAS Devices Unauthenticated Remote Command Execution

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An OS command injection vulnerability exists in multiple Raidsonic NAS devices—specifically tested on IB-NAS5220 and IB-NAS4220—via the unauthenticated timeHandler.cgi endpoint exposed through the web interface. The CGI script fails to properly sanitize user-supplied input in the timeZone parameter of a POST request, allowing remote attackers to inject arbitrary shell commands.

CWE CWE-78
Vendor raidsonic technology gmbh
Product ib-nas5220
Published Aug 1, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for raidsonic technology gmbh ib-nas5220

Be the first to know when new unknown vulnerabilities affecting raidsonic technology gmbh ib-nas5220 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Raidsonic Technology GmbH / IB-NAS5220
*
Raidsonic Technology GmbH / IB-NAS4220
*

References

NVD ↗ CVE.org ↗ EPSS Data ↗
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/raidsonic_nas_ib5220_exec_noauth.rb exploit-db.com: https://www.exploit-db.com/exploits/24499 exploit-db.com: https://www.exploit-db.com/exploits/28508 web.archive.org: https://web.archive.org/web/20160616174425/http://www.s3cur1ty.de/m1adv2013-010 vulncheck.com: https://www.vulncheck.com/advisories/raidsonic-nas-devices-unauth-rce

Credits

Michael Messner