A buffer overflow vulnerability exists in the upload.cgi module of the iptime NAS firmware v1.5.04. The vulnerability arises due to the unsafe use of the strcpy function to copy attacker-controlled data from the CONTENT_TYPE HTTP header into a fixed-size stack buffer (v8, allocated 8 bytes) without bounds checking. Since this operation occurs before authentication logic is executed, the vulnerability is exploitable pre-authentication.
References
| Link | Resource |
|---|---|
| https://github.com/lafdrew/IOT/blob/main/iptime_nas_1.5.04/Buffer-Overflow-in-upload-cgi-of-iptime-nas-1-5-04.md | Exploit Third Party Advisory |
| https://lafdrew.github.io/2025/04/25/Buffer-Overflow-in-upload-cgi-of-iptime-nas-1-5-04/ | Broken Link |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-07-30 19:15
Updated : 2025-08-06 16:22
NVD link : CVE-2025-50464
Mitre link : CVE-2025-50464
CVE.ORG link : CVE-2025-50464
JSON object : View
Products Affected
iptime
- nas_firmware
- nas
CWE
CWE-121
Stack-based Buffer Overflow
