A buffer overflow vulnerability exists in the upload.cgi module of the iptime NAS firmware v1.5.04. The vulnerability arises due to the unsafe use of the strcpy function to copy attacker-controlled data from the CONTENT_TYPE HTTP header into a fixed-size stack buffer (v8, allocated 8 bytes) without bounds checking. Since this operation occurs before authentication logic is executed, the vulnerability is exploitable pre-authentication.
References
Link | Resource |
---|---|
https://github.com/lafdrew/IOT/blob/main/iptime_nas_1.5.04/Buffer-Overflow-in-upload-cgi-of-iptime-nas-1-5-04.md | Exploit Third Party Advisory |
https://lafdrew.github.io/2025/04/25/Buffer-Overflow-in-upload-cgi-of-iptime-nas-1-5-04/ | Broken Link |
Configurations
Configuration 1 (hide)
AND |
|
History
06 Aug 2025, 16:22
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:iptime:nas_firmware:1.5.04:*:*:*:*:*:*:* cpe:2.3:h:iptime:nas:-:*:*:*:*:*:*:* |
|
References | () https://github.com/lafdrew/IOT/blob/main/iptime_nas_1.5.04/Buffer-Overflow-in-upload-cgi-of-iptime-nas-1-5-04.md - Exploit, Third Party Advisory | |
References | () https://lafdrew.github.io/2025/04/25/Buffer-Overflow-in-upload-cgi-of-iptime-nas-1-5-04/ - Broken Link | |
First Time |
Iptime nas Firmware
Iptime nas Iptime |
31 Jul 2025, 18:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-121 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
30 Jul 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-30 19:15
Updated : 2025-08-06 16:22
NVD link : CVE-2025-50464
Mitre link : CVE-2025-50464
CVE.ORG link : CVE-2025-50464
JSON object : View
Products Affected
iptime
- nas
- nas_firmware
CWE
CWE-121
Stack-based Buffer Overflow