CVE-2025-14183: Unprotected Storage of Credentials in SGAI Space1 NAS N1211DS
A vulnerability was found in SGAI Space1 NAS N1211DS up to 1.0.915. This issue affects the function GET_FACTORY_INFO/GET_USER_INFO of the file /cgi-bin/JSONAPI of the component gsaiagent. The manipulation results in unprotected storage of credentials. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14183 is a vulnerability identified in the SGAI Space1 NAS N1211DS device firmware up to version 1.0.915. The flaw resides in the gsaiagent component, specifically in the GET_FACTORY_INFO and GET_USER_INFO functions exposed through the /cgi-bin/JSONAPI endpoint. These functions improperly handle credential storage, resulting in unprotected storage of sensitive credentials. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, making it accessible to unauthenticated attackers. The CVSS 4.0 base score is 5.3 (medium), reflecting the ease of remote exploitation and the impact on confidentiality, though integrity and availability are not directly affected. The exploit allows attackers to retrieve stored credentials, which could be used to gain unauthorized access to the NAS device or pivot to other systems within the network. The vendor was notified early but has not issued any patches or mitigations, and public exploit code is available, increasing the risk of exploitation. The lack of secure credential storage indicates a design weakness in the device's firmware, which may require firmware updates or configuration changes to remediate. This vulnerability highlights the importance of secure credential management and timely vendor response in IoT and NAS devices.
Potential Impact
For European organizations, the impact of CVE-2025-14183 can be significant, especially for those relying on SGAI Space1 NAS N1211DS devices for critical data storage and backup. The unprotected storage of credentials can lead to unauthorized disclosure of sensitive authentication data, enabling attackers to access the NAS device remotely. This can result in data theft, data manipulation, or disruption of services hosted on or backed up by the NAS. Furthermore, compromised credentials may allow attackers to move laterally within the organization's network, escalating privileges or accessing other critical systems. Given the public availability of exploit code and the absence of vendor patches, the risk of exploitation is heightened. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased compliance and reputational risks if this vulnerability is exploited. Additionally, the NAS device may be targeted as part of broader ransomware or espionage campaigns, amplifying the potential damage.
Mitigation Recommendations
1. Immediately isolate affected SGAI Space1 NAS N1211DS devices from untrusted networks to prevent remote exploitation. 2. Restrict access to the /cgi-bin/JSONAPI endpoint via network segmentation and firewall rules, allowing only trusted management IPs. 3. Change all default and factory-set credentials on the NAS device to strong, unique passwords to limit the impact of credential disclosure. 4. Monitor network traffic and device logs for unusual access patterns or attempts to query the vulnerable API functions. 5. If possible, disable or restrict the gsaiagent service or the GET_FACTORY_INFO and GET_USER_INFO functions until a vendor patch is available. 6. Engage with the vendor for updates or firmware patches and subscribe to vulnerability advisories for timely remediation. 7. Consider replacing the affected NAS device with a more secure alternative if no patch is forthcoming. 8. Implement multi-factor authentication and network-level access controls to reduce the risk of unauthorized access even if credentials are compromised. 9. Conduct regular security audits and penetration tests focusing on NAS devices and IoT infrastructure to identify similar weaknesses.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-14183: Unprotected Storage of Credentials in SGAI Space1 NAS N1211DS
Description
A vulnerability was found in SGAI Space1 NAS N1211DS up to 1.0.915. This issue affects the function GET_FACTORY_INFO/GET_USER_INFO of the file /cgi-bin/JSONAPI of the component gsaiagent. The manipulation results in unprotected storage of credentials. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14183 is a vulnerability identified in the SGAI Space1 NAS N1211DS device firmware up to version 1.0.915. The flaw resides in the gsaiagent component, specifically in the GET_FACTORY_INFO and GET_USER_INFO functions exposed through the /cgi-bin/JSONAPI endpoint. These functions improperly handle credential storage, resulting in unprotected storage of sensitive credentials. The vulnerability can be exploited remotely over the network without requiring authentication or user interaction, making it accessible to unauthenticated attackers. The CVSS 4.0 base score is 5.3 (medium), reflecting the ease of remote exploitation and the impact on confidentiality, though integrity and availability are not directly affected. The exploit allows attackers to retrieve stored credentials, which could be used to gain unauthorized access to the NAS device or pivot to other systems within the network. The vendor was notified early but has not issued any patches or mitigations, and public exploit code is available, increasing the risk of exploitation. The lack of secure credential storage indicates a design weakness in the device's firmware, which may require firmware updates or configuration changes to remediate. This vulnerability highlights the importance of secure credential management and timely vendor response in IoT and NAS devices.
Potential Impact
For European organizations, the impact of CVE-2025-14183 can be significant, especially for those relying on SGAI Space1 NAS N1211DS devices for critical data storage and backup. The unprotected storage of credentials can lead to unauthorized disclosure of sensitive authentication data, enabling attackers to access the NAS device remotely. This can result in data theft, data manipulation, or disruption of services hosted on or backed up by the NAS. Furthermore, compromised credentials may allow attackers to move laterally within the organization's network, escalating privileges or accessing other critical systems. Given the public availability of exploit code and the absence of vendor patches, the risk of exploitation is heightened. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, face increased compliance and reputational risks if this vulnerability is exploited. Additionally, the NAS device may be targeted as part of broader ransomware or espionage campaigns, amplifying the potential damage.
Mitigation Recommendations
1. Immediately isolate affected SGAI Space1 NAS N1211DS devices from untrusted networks to prevent remote exploitation. 2. Restrict access to the /cgi-bin/JSONAPI endpoint via network segmentation and firewall rules, allowing only trusted management IPs. 3. Change all default and factory-set credentials on the NAS device to strong, unique passwords to limit the impact of credential disclosure. 4. Monitor network traffic and device logs for unusual access patterns or attempts to query the vulnerable API functions. 5. If possible, disable or restrict the gsaiagent service or the GET_FACTORY_INFO and GET_USER_INFO functions until a vendor patch is available. 6. Engage with the vendor for updates or firmware patches and subscribe to vulnerability advisories for timely remediation. 7. Consider replacing the affected NAS device with a more secure alternative if no patch is forthcoming. 8. Implement multi-factor authentication and network-level access controls to reduce the risk of unauthorized access even if credentials are compromised. 9. Conduct regular security audits and penetration tests focusing on NAS devices and IoT infrastructure to identify similar weaknesses.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T09:01:49.659Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6934fd445cd7c00bf6d1c497
Added to database: 12/7/2025, 4:06:28 AM
Last enriched: 12/7/2025, 4:06:40 AM
Last updated: 12/7/2025, 3:57:52 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14195: Unrestricted Upload in code-projects Employee Profile Management System
MediumCVE-2025-14196: Buffer Overflow in H3C Magic B1
HighCVE-2025-14194: Cross Site Scripting in code-projects Employee Profile Management System
MediumCVE-2025-14192: SQL Injection in RashminDungrani online-banking
MediumCVE-2025-14193: SQL Injection in code-projects Employee Profile Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.