Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14183: Unprotected Storage of Credentials in SGAI Space1 NAS N1211DS

0
Medium
VulnerabilityCVE-2025-14183cvecve-2025-14183
Published: Sun Dec 07 2025 (12/07/2025, 03:02:05 UTC)
Source: CVE Database V5
Vendor/Project: SGAI
Product: Space1 NAS N1211DS

Description

A vulnerability was found in SGAI Space1 NAS N1211DS up to 1.0.915. This issue affects the function GET_FACTORY_INFO/GET_USER_INFO of the file /cgi-bin/JSONAPI of the component gsaiagent. The manipulation results in unprotected storage of credentials. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/07/2025, 04:06:40 UTC

Technical Analysis

CVE-2025-14183 is a vulnerability identified in the SGAI Space1 NAS N1211DS device firmware up to version 1.0.915. The flaw resides in the gsaiagent component, specifically in the GET_FACTORY_INFO and GET_USER_INFO functions exposed through the /cgi-bin/JSONAPI endpoint. These functions improperly handle credential storage, resulting in unprotected storage of sensitive credentials. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, making it accessible to unauthenticated attackers. The CVSS 4.0 base score is 5.3 (medium), reflecting the ease of remote exploitation and the impact on confidentiality, though integrity and availability are not directly affected. The exploit allows attackers to retrieve stored credentials, which could be used to gain unauthorized access to the NAS device or pivot to other systems within the network. The vendor was notified early but has not issued any patches or mitigations, and public exploit code is available, increasing the risk of exploitation. The lack of secure credential storage indicates a design weakness in the device's firmware, which may require firmware updates or configuration changes to remediate. This vulnerability highlights the importance of secure credential management and timely vendor response in IoT and NAS devices.

Potential Impact

For European organizations, the impact of CVE-2025-14183 can be significant, especially for those relying on SGAI Space1 NAS N1211DS devices for critical data storage and backup. The unprotected storage of credentials can lead to unauthorized disclosure of sensitive authentication data, enabling attackers to access the NAS device remotely. This can result in data theft, data manipulation, or disruption of services hosted on or backed up by the NAS. Furthermore, compromised credentials may allow attackers to move laterally within the organization's network, escalating privileges or accessing other critical systems. Given the public availability of exploit code and the absence of vendor patches, the risk of exploitation is heightened. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased compliance and reputational risks if this vulnerability is exploited. Additionally, the NAS device may be targeted as part of broader ransomware or espionage campaigns, amplifying the potential damage.

Mitigation Recommendations

1. Immediately isolate affected SGAI Space1 NAS N1211DS devices from untrusted networks to prevent remote exploitation. 2. Restrict access to the /cgi-bin/JSONAPI endpoint via network segmentation and firewall rules, allowing only trusted management IPs. 3. Change all default and factory-set credentials on the NAS device to strong, unique passwords to limit the impact of credential disclosure. 4. Monitor network traffic and device logs for unusual access patterns or attempts to query the vulnerable API functions. 5. If possible, disable or restrict the gsaiagent service or the GET_FACTORY_INFO and GET_USER_INFO functions until a vendor patch is available. 6. Engage with the vendor for updates or firmware patches and subscribe to vulnerability advisories for timely remediation. 7. Consider replacing the affected NAS device with a more secure alternative if no patch is forthcoming. 8. Implement multi-factor authentication and network-level access controls to reduce the risk of unauthorized access even if credentials are compromised. 9. Conduct regular security audits and penetration tests focusing on NAS devices and IoT infrastructure to identify similar weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T09:01:49.659Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6934fd445cd7c00bf6d1c497

Added to database: 12/7/2025, 4:06:28 AM

Last enriched: 12/7/2025, 4:06:40 AM

Last updated: 12/7/2025, 3:57:52 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats