Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14108: Command Injection in ZSPACE Q2C NAS

0
High
VulnerabilityCVE-2025-14108cvecve-2025-14108
Published: Fri Dec 05 2025 (12/05/2025, 22:02:05 UTC)
Source: CVE Database V5
Vendor/Project: ZSPACE
Product: Q2C NAS

Description

A weakness has been identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure and confirmed the existence of the vulnerability. A technical fix is planned to be released.

AI-Powered Analysis

AILast updated: 12/19/2025, 23:58:35 UTC

Technical Analysis

CVE-2025-14108 is a critical command injection vulnerability identified in the ZSPACE Q2C NAS product, specifically affecting version 1.1.0210050 and earlier. The vulnerability resides in the zfilev2_api.OpenSafe function, which handles HTTP POST requests at the endpoint /v2/file/safe/open. The issue arises from improper sanitization of the safe_dir parameter, allowing an attacker to inject arbitrary operating system commands. This vulnerability can be exploited remotely without requiring authentication or user interaction, significantly increasing the attack surface. The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, as successful exploitation could lead to full system compromise, data theft, or disruption of NAS services. Although no active exploitation has been reported, the public availability of exploit code raises the likelihood of imminent attacks. The vendor has been notified and confirmed the vulnerability, with a patch planned but not yet released. The vulnerability does not require special privileges or complex attack vectors, making it accessible to a broad range of threat actors. The NAS device is typically used for centralized storage and file sharing, so exploitation could affect multiple users and connected systems within an organization.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to severe consequences including unauthorized access to sensitive data stored on the NAS, potential lateral movement within corporate networks, and disruption of critical file services. Confidentiality is at risk as attackers could exfiltrate data; integrity could be compromised by altering or deleting files; and availability could be impacted by executing destructive commands or ransomware deployment. Organizations relying on ZSPACE Q2C NAS for essential storage or backup functions may face operational downtime and data loss. Given the remote, unauthenticated nature of the exploit, attackers could target vulnerable devices exposed to the internet or accessible within internal networks. This risk is heightened in sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe. The public release of exploit code increases the urgency for mitigation to prevent potential widespread attacks.

Mitigation Recommendations

1. Immediately restrict network access to the ZSPACE Q2C NAS devices by implementing firewall rules to limit access to trusted IP addresses and internal networks only. 2. Disable or restrict access to the vulnerable API endpoint /v2/file/safe/open if possible through configuration or network controls. 3. Monitor network traffic and system logs for unusual activity related to the safe_dir parameter or unexpected command execution attempts. 4. Apply vendor patches promptly once released to remediate the vulnerability. 5. If a patch is not yet available, consider isolating the NAS devices from the internet and untrusted networks to reduce exposure. 6. Conduct a thorough audit of NAS device configurations and user permissions to minimize attack surface. 7. Educate IT and security teams about the vulnerability and signs of exploitation to enable rapid detection and response. 8. Implement network segmentation to limit potential lateral movement from compromised NAS devices. 9. Regularly back up critical data stored on the NAS to secure, offline locations to mitigate data loss risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-05T14:52:23.206Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69335977f88dbe026c240f1b

Added to database: 12/5/2025, 10:15:19 PM

Last enriched: 12/19/2025, 11:58:35 PM

Last updated: 1/20/2026, 6:25:33 PM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats