Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14183: Unprotected Storage of Credentials in SGAI Space1 NAS N1211DS

0
Medium
VulnerabilityCVE-2025-14183cvecve-2025-14183
Published: Sun Dec 07 2025 (12/07/2025, 03:02:05 UTC)
Source: CVE Database V5
Vendor/Project: SGAI
Product: Space1 NAS N1211DS

Description

A vulnerability was found in SGAI Space1 NAS N1211DS up to 1.0.915. This issue affects the function GET_FACTORY_INFO/GET_USER_INFO of the file /cgi-bin/JSONAPI of the component gsaiagent. The manipulation results in unprotected storage of credentials. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/14/2025, 04:57:07 UTC

Technical Analysis

CVE-2025-14183 is a vulnerability identified in the SGAI Space1 NAS N1211DS device, specifically affecting firmware versions up to 1.0.915. The issue resides in the gsaiagent component's /cgi-bin/JSONAPI interface, particularly in the GET_FACTORY_INFO and GET_USER_INFO functions. These functions improperly handle credential storage, resulting in unprotected storage of sensitive authentication data within the device. Because the vulnerability can be exploited remotely without requiring authentication or user interaction, an attacker can directly query these API endpoints to retrieve stored credentials. The exposure of these credentials could allow attackers to gain unauthorized access to the NAS device or escalate privileges within the network. The vendor was informed early about this vulnerability but has not issued any patches or advisories, increasing the risk for users. The vulnerability has a CVSS 4.0 score of 5.3, indicating medium severity, with an attack vector classified as network-based and low attack complexity. While no known exploits are currently observed in the wild, a public exploit exists, which could facilitate exploitation by malicious actors. The lack of secure credential storage violates best practices for sensitive data protection and poses a significant risk to the confidentiality and integrity of data stored on affected devices.

Potential Impact

For European organizations, the unprotected storage of credentials in the SGAI Space1 NAS N1211DS can lead to unauthorized access to sensitive data repositories, potentially resulting in data breaches, intellectual property theft, or disruption of business operations. Since NAS devices often serve as centralized storage for critical files, exposure of credentials could allow attackers to move laterally within networks, escalate privileges, or deploy ransomware. The remote exploitability without authentication increases the attack surface, especially for organizations with NAS devices exposed to less secure network segments or the internet. The absence of vendor response and patches heightens the risk, as organizations must rely on workarounds or mitigations. This vulnerability could also impact compliance with European data protection regulations such as GDPR, given the potential for unauthorized data access. Industries with high reliance on NAS devices for data storage, including manufacturing, finance, and public sector entities, may face operational and reputational damage if exploited.

Mitigation Recommendations

European organizations using the SGAI Space1 NAS N1211DS should immediately assess their exposure by identifying devices running vulnerable firmware versions. Since no official patch is available, organizations should restrict network access to the NAS management interfaces, especially the /cgi-bin/JSONAPI endpoint, by implementing strict firewall rules and network segmentation to limit access to trusted administrators only. Employ VPNs or zero-trust network access solutions for remote management to prevent unauthorized external access. Regularly monitor network traffic for unusual API requests targeting the vulnerable functions. Consider disabling or restricting the gsaiagent service or the affected API endpoints if feasible without disrupting operations. Implement strong credential policies and rotate any credentials stored on the device to limit the impact of potential leaks. Maintain up-to-date asset inventories and monitor vendor communications for any future patches or advisories. Finally, conduct security awareness training for IT staff to recognize and respond to potential exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T09:01:49.659Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6934fd445cd7c00bf6d1c497

Added to database: 12/7/2025, 4:06:28 AM

Last enriched: 12/14/2025, 4:57:07 AM

Last updated: 2/7/2026, 3:12:37 AM

Views: 166

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats