From db8a49cc99fe0fa4cd0cec965ead4f357efebd61 Mon Sep 17 00:00:00 2001 From: h00die-gr3y Date: Sat, 10 Jun 2023 12:14:05 +0000 Subject: [PATCH] Updated documentation --- .../exploit/linux/http/terramaster_unauth_rce_cve_2022_24990.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/documentation/modules/exploit/linux/http/terramaster_unauth_rce_cve_2022_24990.md b/documentation/modules/exploit/linux/http/terramaster_unauth_rce_cve_2022_24990.md index d805d41a67..3ed77801ba 100644 --- a/documentation/modules/exploit/linux/http/terramaster_unauth_rce_cve_2022_24990.md +++ b/documentation/modules/exploit/linux/http/terramaster_unauth_rce_cve_2022_24990.md @@ -6,6 +6,8 @@ to achieve an unauthenticated RCE by exploiting vulnerable endpoint `api.php?mob admin password hash and mac address to achieve unauthenticated access and use the vulnerable endpoint`api.php?mobile/createRaid` with `POST` parameters `raidtype` / `diskstring` to upload a webshell and execute remote code as root on TerraMaster NAS devices. +All TerraMaster devices running TerraMaster Operating System (TOS) `4.2.29` or lower are vulnerable. + Installing a vulnerable test bed requires a TerraMaster NAS device that can run `TOS 4.x` This module has been tested against a TerraMaster `F2-221` Model with the specifications listed below: