TerraMaster NAS TOS <= 3.0.30...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

Recently I bought a TerraMaster F2-420 NAS from Amazon in order to store my private code, backups and this kind of stuff. As soon as it arrived I started to play with its web interface and eventually I wanted to see how it was implemented, moreover I was curious to see if I could find any remotely exploitable vulnerability. As you can see … I succeeded :) ![](https://images.seebug.org/1496282075151) Once connected to the NAS through SSH, I realized the whole interface was a PHP application stored on /usr/www/, but unfortunately the source code was obfuscated: ![](https://images.seebug.org/1496282097026) Printing PHP compilation options and modules revealed what kind of obfuscation was going on, php_screw: ![](https://images.seebug.org/1496282128319) Lucky me, there’s the [php_unscrew](https://github.com/dehydr8/php_unscrew) tool written by Osama Khalid, I only had to follow the instructions on the repository in order to extract the key and header length from the encrypted files on...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息