The web server is not checking the validity of the request, it is only verifying if the password matches. This issue can be exploited to gain unauthorised access to the system.

How to exploit this issue? - Remote attackers can access a vulnerable system by sending a crafted request, for example, a user may send an HTTP request with a crafted ‘Location’ header. An unauthenticated remote attacker can exploit this vulnerability, to log in to the system and access data. - In order to exploit this vulnerability, user needs to send a request with a crafted 'location' header. An attacker can send a request with a crafted 'location' header, for example, an HTTP request with a crafted 'Location' header. An unauthenticated remote attacker can exploit this vulnerability, to get system access. - In order to exploit this vulnerability, user needs to send a request with a crafted 'location' header. An attacker can send a request with a crafted 'Location' header, for example, an HTTP request with a crafted 'Location' header. An unauthenticated remote attacker can exploit this vulnerability, to get system access. - In order to exploit this vulnerability, user needs to send a request with a crafted 'location' header. An attacker can send a request with a crafted 'Location' header, for example, an HTTP request with a crafted 'Location' header. An unauthenticated remote attacker can exploit this vulnerability, to get system access. - In order

Discussions

This CVE is related to password verification. This issue can be exploited by remote attackers to gain unauthorised access to the system.
The attacker sends a request with a crafted 'Location' header, like an HTTP request with a malicious 'location' header. An unauthenticated remote attacker can exploit this vulnerability, to get system access.

Vulnerable firmware versions##

- QNAP TS-853: v1.0 to v1.4
- QNAP TS-863: v1.0 to v1.7
- Synology DS1513+: v6.2 to v7.2

Timeline

Published on: 11/15/2022 21:15:00 UTC
Last modified on: 11/15/2022 21:56:00 UTC

References