info: name: TerraMaster TOS <4.2.30- Unauthenticated Remote Code Execution author: iamnoooob,DhiyaneshDK severity: critical description: | TerraMaster NAS versions through 4.2.30 contain a remote code execution caused by unsanitized parameters raidtype and diskstring in api.php?mobile/createRaid, letting WAN attackers execute arbitrary code as root, exploit requires remote network access and crafted parameters. impact: | An attacker can execute arbitrary commands on the server, leading to a full compromise of the system. remediation: | Upgrade the TerraMaster TOS server to version 4.2.30or later to mitigate the vulnerability. reference: - https://github.com/0xf4n9x/CVE-2022-24990 - https://octagon.net/blog/2022/03/07/cve-2022-24990-terrmaster-tos-unauthenticated-remote-command-execution-via-php-object-instantiation - https://packetstormsecurity.com/files/172904 - https://nvd.nist.gov/vuln/detail/CVE-2022-24990 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score:9.8 cve-id: CVE-2022-24990 cwe-id: CWE-78 epss-score:0.94401 epss-percentile:0.99970 cpe: cpe:2.3:o:terra-master:terramaster_operating_system:*:*:*:*:*:*:*:* metadata: max-request:2 vendor: terra-master product: terramaster_operating_system shodan-query: 'TerraMaster' fofa-query: app="TerraMaster-TOS" google-query: intitle:"TOS" tags: cve,cve2022,terramaster,rce,unauth,kev,terra-master