CVE-2025-14107
Published: 05 December 2025
Description
A security flaw has been discovered in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this vulnerability is the function zfilev2_api.SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation of the argument safe_dir results in…
more
command injection. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure and confirmed the existence of the vulnerability. A technical fix is planned to be released.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents command injection by validating the manipulated safe_dir argument in the HTTP POST request to the vulnerable endpoint.
Ensures timely identification, reporting, and patching of the command injection flaw in ZSPACE Q2C NAS firmware up to version 1.1.0210050.
Enables monitoring for anomalous POST requests to /v2/file/safe/status, identifying exploitation attempts of the command injection vulnerability.
Security SummaryAI
CVE-2025-14107 is a command injection vulnerability affecting ZSPACE Q2C NAS devices running versions up to 1.1.0210050. The flaw resides in the zfilev2_api.SafeStatus function, exposed via the /v2/file/safe/status endpoint in the HTTP POST Request Handler component. By manipulating the safe_dir argument in a POST request, an attacker can inject arbitrary commands, as classified under CWE-74 (injection) and CWE-77 (command injection specifically). The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for remote exploitation with significant impacts on confidentiality, integrity, and availability.
Attackers with low privileges (PR:L), such as authenticated users, can exploit this remotely over the network with low complexity and no user interaction required. Successful exploitation allows arbitrary command execution on the underlying system, potentially leading to full compromise including data exfiltration, modification, or disruption of NAS services. An exploit has been publicly released, increasing the risk of widespread abuse.
VulDB advisories (e.g., ctiid.334489, id.334489) detail the issue, noting that the vendor was notified early, confirmed the vulnerability, and plans to release a technical fix. No patches are available as of the CVE publication on 2025-12-05, so practitioners should restrict access to the affected endpoint, monitor for anomalous POST requests to /v2/file/safe/status, and prepare for upgrades. Additional details are available in the referenced Notion document.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The remote command injection vulnerability (CWE-77) in the public-facing HTTP POST endpoint (/v2/file/safe/status) enables exploitation of a public-facing application (T1190), execution of Unix shell commands (T1059.004), indirect command execution (T1202 as cited in advisory), and exploitation of remote services for RCE (T1210).