CVE-2025-69431
Symbolic Link Vulnerability in ZSPACE Q2C NAS Enables Data Tampering
Publication date: 2026-02-03
Last updated on: 2026-02-11
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zspace | q2c_firmware | to 1.1.0210050 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-59 | The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The ZSPACE Q2C NAS has a vulnerability involving incorrect handling of symbolic links. An attacker can format a USB drive with the ext4 filesystem, create a symbolic link pointing to the root directory of that drive, and then insert the USB drive into the NAS device. The NAS mounts the USB drive and exposes its directory via the Samba protocol, allowing the attacker to access the USB drive's directory through the NAS.
This process enables the attacker to bypass normal access controls and gain access to files within the NAS system by following the symbolic link, potentially leading to unauthorized file access and tampering.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to obtain all files stored within the NAS system and tamper with them. This means sensitive or critical data could be accessed, modified, or corrupted without authorization.
Such unauthorized access and tampering can lead to data breaches, loss of data integrity, disruption of services, and potential exposure of confidential information.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know