Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14184: Command Injection in SGAI Space1 NAS N1211DS

0
Medium
VulnerabilityCVE-2025-14184cvecve-2025-14184
Published: Sun Dec 07 2025 (12/07/2025, 04:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SGAI
Product: Space1 NAS N1211DS

Description

A vulnerability was determined in SGAI Space1 NAS N1211DS up to 1.0.915. Impacted is the function RENAME_FILE/OPERATE_FILE/NGNIX_UPLOAD of the file /cgi-bin/JSONAPI of the component gsaiagent. This manipulation causes command injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/14/2025, 06:00:04 UTC

Technical Analysis

CVE-2025-14184 is a command injection vulnerability identified in the SGAI Space1 NAS N1211DS device firmware up to version 1.0.915. The vulnerability resides in the gsaiagent component, specifically within the /cgi-bin/JSONAPI endpoint that handles file operations such as RENAME_FILE, OPERATE_FILE, and NGNIX_UPLOAD. Due to insufficient input validation or sanitization in these functions, an attacker can inject arbitrary shell commands remotely without requiring authentication or user interaction. This allows the attacker to execute commands with the privileges of the gsaiagent process, potentially leading to full system compromise. The vulnerability is exploitable over the network (AV:N), requires low attack complexity (AC:L), and does not require privileges (PR:L) or user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), resulting in a CVSS 4.0 base score of 5.3 (medium severity). The vendor was notified but has not responded or issued patches, and no known exploits have been reported in the wild. This leaves affected devices exposed to potential exploitation, especially in environments where the NAS is accessible remotely or insufficiently protected.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized command execution on critical NAS devices, resulting in data theft, data manipulation, or service disruption. Given that NAS devices often store sensitive corporate data, intellectual property, or backups, compromise could severely impact confidentiality and integrity. Availability could also be affected if attackers delete or corrupt stored files or disrupt NAS operations. The lack of vendor response and patches increases the risk exposure period. Organizations relying on SGAI Space1 NAS N1211DS for centralized storage or backup services are particularly vulnerable if these devices are accessible from untrusted networks. This could affect sectors such as finance, manufacturing, healthcare, and government agencies that use NAS for critical data storage and sharing. The medium severity rating indicates a moderate risk, but the ease of remote exploitation without authentication elevates the threat level in practice.

Mitigation Recommendations

1. Immediately restrict network access to the affected NAS devices by implementing strict firewall rules and network segmentation to isolate them from untrusted networks, especially the internet. 2. Disable or restrict access to the /cgi-bin/JSONAPI interface if possible, or limit it to trusted internal IP addresses only. 3. Monitor network traffic and device logs for unusual or unauthorized commands or access attempts targeting the JSONAPI endpoint. 4. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns or anomalous API usage. 5. If feasible, replace or upgrade affected NAS devices to models or firmware versions not impacted by this vulnerability. 6. Maintain regular backups of critical data stored on the NAS, ensuring backups are stored offline or on separate systems to prevent compromise. 7. Engage with the vendor for updates or patches and apply them promptly once available. 8. Educate IT staff about this vulnerability and ensure incident response plans include steps for potential NAS compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-06T09:02:18.724Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6935065f5cd7c00bf6e3233d

Added to database: 12/7/2025, 4:45:19 AM

Last enriched: 12/14/2025, 6:00:04 AM

Last updated: 2/4/2026, 12:15:52 PM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats