Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14106: Command Injection in ZSPACE Q2C NAS

0
High
VulnerabilityCVE-2025-14106cvecve-2025-14106
Published: Fri Dec 05 2025 (12/05/2025, 21:32:06 UTC)
Source: CVE Database V5
Vendor/Project: ZSPACE
Product: Q2C NAS

Description

A vulnerability was identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected is the function zfilev2_api.CloseSafe of the file /v2/file/safe/close of the component HTTP POST Request Handler. The manipulation of the argument safe_dir leads to command injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure and confirmed the existence of the vulnerability. A technical fix is planned to be released.

AI-Powered Analysis

AILast updated: 12/19/2025, 22:51:48 UTC

Technical Analysis

CVE-2025-14106 is a critical command injection vulnerability found in the ZSPACE Q2C NAS product, specifically affecting versions up to 1.1.0210050. The flaw resides in the HTTP POST request handler for the endpoint /v2/file/safe/close, within the function zfilev2_api.CloseSafe. The vulnerability arises from improper sanitization of the safe_dir argument, which an attacker can manipulate to inject arbitrary operating system commands. This injection occurs remotely over the network without requiring authentication or user interaction, making exploitation straightforward. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low complexity, no authentication, and high impact on confidentiality, integrity, and availability. The vendor has acknowledged the vulnerability and is preparing a technical fix, but no patch is currently available. Although no confirmed exploits in the wild have been reported, publicly available proof-of-concept code increases the risk of imminent attacks. This vulnerability could allow attackers to execute arbitrary commands on the NAS device, potentially leading to data theft, device takeover, or disruption of services. Given the critical role NAS devices play in data storage and sharing, exploitation could severely impact organizational operations and data security.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for remote command execution on NAS devices that often store sensitive corporate and personal data. Successful exploitation could lead to unauthorized data access, data corruption, or complete device compromise, impacting confidentiality, integrity, and availability of critical information assets. Organizations relying on ZSPACE Q2C NAS for backup, file sharing, or archival storage could face operational disruptions, data breaches, and compliance violations under GDPR. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation. Additionally, compromised NAS devices could serve as footholds for lateral movement within corporate networks, escalating the threat to broader IT infrastructure. The public availability of exploit code further elevates the urgency for European entities to implement mitigations promptly.

Mitigation Recommendations

European organizations should immediately implement network-level restrictions to limit access to the ZSPACE Q2C NAS management interfaces, ideally isolating them within secure internal networks or VPNs. Employ strict firewall rules to block unauthorized external access to the vulnerable HTTP endpoint. Monitor network traffic and system logs for unusual commands or access patterns targeting the /v2/file/safe/close endpoint. Disable or restrict the use of the vulnerable API if possible until a patch is available. Engage with ZSPACE support to obtain early access to patches or workarounds and plan for rapid deployment once released. Conduct thorough audits of NAS device configurations to ensure minimal exposure and enforce strong access controls. Additionally, implement intrusion detection systems capable of identifying command injection attempts and maintain up-to-date backups stored offline to enable recovery in case of compromise. Educate IT staff about this vulnerability and the importance of timely patching and monitoring.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-05T14:52:09.251Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6933526ff88dbe026c2031cc

Added to database: 12/5/2025, 9:45:19 PM

Last enriched: 12/19/2025, 10:51:48 PM

Last updated: 1/20/2026, 8:57:14 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats