Updated documentation
This commit is contained in:
@@ -6,6 +6,8 @@ to achieve an unauthenticated RCE by exploiting vulnerable endpoint `api.php?mob
|
||||
admin password hash and mac address to achieve unauthenticated access and use the vulnerable endpoint`api.php?mobile/createRaid` with
|
||||
`POST` parameters `raidtype` / `diskstring` to upload a webshell and execute remote code as root on TerraMaster NAS devices.
|
||||
|
||||
All TerraMaster devices running TerraMaster Operating System (TOS) `4.2.29` or lower are vulnerable.
|
||||
|
||||
Installing a vulnerable test bed requires a TerraMaster NAS device that can run `TOS 4.x`
|
||||
This module has been tested against a TerraMaster `F2-221` Model with the specifications listed below:
|
||||
|
||||
|
||||
Reference in New Issue
Block a user