Vulnerability Description
A buffer overflow vulnerability exists in the upload.cgi module of the iptime NAS firmware v1.5.04. The vulnerability arises due to the unsafe use of the strcpy function to copy attacker-controlled data from the CONTENT_TYPE HTTP header into a fixed-size stack buffer (v8, allocated 8 bytes) without bounds checking. Since this operation occurs before authentication logic is executed, the vulnerability is exploitable pre-authentication.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Iptime | Nas Firmware | 1.5.04 |
| Iptime | Nas | - |
Related Weaknesses (CWE)
References
- https://github.com/lafdrew/IOT/blob/main/iptime_nas_1.5.04/Buffer-Overflow-in-upExploitThird Party Advisory
- https://lafdrew.github.io/2025/04/25/Buffer-Overflow-in-upload-cgi-of-iptime-nasBroken Link
FAQ
What is CVE-2025-50464?
CVE-2025-50464 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A buffer overflow vulnerability exists in the upload.cgi module of the iptime NAS firmware v1.5.04. The vulnerability arises due to the unsafe use of the strcpy function to copy attacker-controlled da...
How severe is CVE-2025-50464?
CVE-2025-50464 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-50464?
Check the references section above for vendor advisories and patch information. Affected products include: Iptime Nas Firmware, Iptime Nas.