CVE-2025-14183
BaseFortify
Publication date: 2025-12-07
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sgai | gsaiagent | * |
| sgai | space1_nas | n1211ds |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-255 | |
| CWE-256 | The product stores a password in plaintext within resources such as memory or files. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in SGAI Space1 NAS N1211DS up to version 1.0.915, specifically in the GET_FACTORY_INFO and GET_USER_INFO functions of the /cgi-bin/JSONAPI file within the gsaiagent component. It allows remote attackers to manipulate the system resulting in unprotected storage of credentials. The exploit is publicly known and can be used to compromise the device.
How can this vulnerability impact me? :
The vulnerability can lead to exposure of stored credentials due to unprotected storage, which can be exploited remotely. This could allow attackers to gain unauthorized access to the device or its data, potentially compromising the security and privacy of the system and its users.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability involves unprotected storage of credentials and unauthorized remote access to sensitive information such as account details and passwords in plaintext. This exposure of sensitive personal and system data could lead to non-compliance with data protection regulations like GDPR and HIPAA, which require proper protection of personal and sensitive information. However, no explicit mention of compliance impact or regulatory consequences is provided in the resources. [1, 2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can be performed by attempting to access the vulnerable API endpoints /cgi-bin/JSONAPI with the GET_FACTORY_INFO or GET_USER_INFO functions to check if sensitive information such as credentials is exposed without proper authentication. For example, using curl commands to send requests to these endpoints and observe if sensitive data is returned. A sample command could be: curl -X GET "http://<device-ip>/cgi-bin/JSONAPI?function=GET_USER_INFO". If the response contains plaintext credentials or sensitive information without authentication, the device is vulnerable. [1, 2, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting network access to the affected NAS device to trusted users only, such as by using firewall rules or network segmentation to prevent unauthorized remote access. Since no patches or vendor responses are available, consider replacing the affected device with a more secure alternative. Monitoring network traffic for suspicious access to the vulnerable API endpoints is also recommended. [2]