CVE-2025-14188: Command Injection in UGREEN DH2100+
A security vulnerability has been detected in UGREEN DH2100+ up to 5.3.0.251125. This impacts the function handler_file_backup_create of the file /v1/file/backup/create of the component nas_svr. The manipulation of the argument path leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. Upgrading the affected component is advised.
AI Analysis
Technical Summary
CVE-2025-14188 is a remote command injection vulnerability identified in the UGREEN DH2100+ network-attached storage (NAS) device, specifically affecting firmware versions up to 5.3.0.251125. The vulnerability resides in the nas_svr component's API endpoint /v1/file/backup/create, within the function handler_file_backup_create. The flaw is triggered by improper sanitization of the 'path' parameter, allowing an attacker to inject and execute arbitrary system commands remotely. This vulnerability does not require user interaction or prior authentication, significantly lowering the barrier for exploitation. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no user interaction, but requires high privileges, with high impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The ability to execute arbitrary commands remotely can lead to full system compromise, data theft, disruption of services, or use of the device as a pivot point for further network attacks. Given the critical role NAS devices play in data storage and backup, this vulnerability poses a significant risk to organizations relying on UGREEN DH2100+ devices.
Potential Impact
For European organizations, exploitation of CVE-2025-14188 could result in unauthorized access to sensitive data stored on UGREEN DH2100+ devices, data corruption or deletion, and potential disruption of backup and storage services. This could lead to operational downtime, loss of critical business information, and exposure of confidential data, impacting compliance with data protection regulations such as GDPR. Attackers could leverage compromised devices to move laterally within networks, increasing the risk of broader intrusions. Sectors such as finance, healthcare, manufacturing, and government agencies that rely on NAS devices for secure data storage are particularly vulnerable. The remote nature of the exploit and lack of required user interaction make it a potent threat in environments where these devices are accessible from untrusted networks or insufficiently segmented internal networks.
Mitigation Recommendations
Organizations should immediately verify the firmware version of their UGREEN DH2100+ devices and upgrade to a patched version once available from the vendor. Until a patch is released, restrict network access to the NAS management interfaces, especially the /v1/file/backup/create endpoint, by implementing firewall rules and network segmentation to limit exposure to trusted hosts only. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious command injection patterns targeting the NAS device. Regularly audit device configurations and logs for signs of unauthorized access or anomalous command executions. Additionally, enforce the principle of least privilege for administrative accounts on the NAS device to reduce the impact of potential exploitation. Consider isolating NAS devices on dedicated VLANs and applying strict access control lists (ACLs) to minimize attack surface. Finally, maintain an incident response plan tailored to NAS device compromise scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14188: Command Injection in UGREEN DH2100+
Description
A security vulnerability has been detected in UGREEN DH2100+ up to 5.3.0.251125. This impacts the function handler_file_backup_create of the file /v1/file/backup/create of the component nas_svr. The manipulation of the argument path leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. Upgrading the affected component is advised.
AI-Powered Analysis
Technical Analysis
CVE-2025-14188 is a remote command injection vulnerability identified in the UGREEN DH2100+ network-attached storage (NAS) device, specifically affecting firmware versions up to 5.3.0.251125. The vulnerability resides in the nas_svr component's API endpoint /v1/file/backup/create, within the function handler_file_backup_create. The flaw is triggered by improper sanitization of the 'path' parameter, allowing an attacker to inject and execute arbitrary system commands remotely. This vulnerability does not require user interaction or prior authentication, significantly lowering the barrier for exploitation. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no user interaction, but requires high privileges, with high impact on confidentiality, integrity, and availability. Although no exploits have been observed in the wild yet, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The ability to execute arbitrary commands remotely can lead to full system compromise, data theft, disruption of services, or use of the device as a pivot point for further network attacks. Given the critical role NAS devices play in data storage and backup, this vulnerability poses a significant risk to organizations relying on UGREEN DH2100+ devices.
Potential Impact
For European organizations, exploitation of CVE-2025-14188 could result in unauthorized access to sensitive data stored on UGREEN DH2100+ devices, data corruption or deletion, and potential disruption of backup and storage services. This could lead to operational downtime, loss of critical business information, and exposure of confidential data, impacting compliance with data protection regulations such as GDPR. Attackers could leverage compromised devices to move laterally within networks, increasing the risk of broader intrusions. Sectors such as finance, healthcare, manufacturing, and government agencies that rely on NAS devices for secure data storage are particularly vulnerable. The remote nature of the exploit and lack of required user interaction make it a potent threat in environments where these devices are accessible from untrusted networks or insufficiently segmented internal networks.
Mitigation Recommendations
Organizations should immediately verify the firmware version of their UGREEN DH2100+ devices and upgrade to a patched version once available from the vendor. Until a patch is released, restrict network access to the NAS management interfaces, especially the /v1/file/backup/create endpoint, by implementing firewall rules and network segmentation to limit exposure to trusted hosts only. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious command injection patterns targeting the NAS device. Regularly audit device configurations and logs for signs of unauthorized access or anomalous command executions. Additionally, enforce the principle of least privilege for administrative accounts on the NAS device to reduce the impact of potential exploitation. Consider isolating NAS devices on dedicated VLANs and applying strict access control lists (ACLs) to minimize attack surface. Finally, maintain an incident response plan tailored to NAS device compromise scenarios.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-06T14:14:54.401Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693560d76d1d87ed0c725dbf
Added to database: 12/7/2025, 11:11:19 AM
Last enriched: 1/28/2026, 7:19:08 PM
Last updated: 2/7/2026, 1:12:08 AM
Views: 220
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.