This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Western Digital MyCloud PR4100. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ConnectivityService service. The issue results from the lack of proper authentication of data received via HTTP. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Western Digital My Cloud PR4100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-15859 is critical due to its ability to allow arbitrary code execution without authentication.
To fix ZDI-CAN-15859, update the firmware of your Western Digital MyCloud PR4100 to the latest version provided by the vendor.
ZDI-CAN-15859 affects installations of Western Digital MyCloud PR4100 devices.
Yes, ZDI-CAN-15859 can be exploited by network-adjacent attackers.
No, ZDI-CAN-15859 does not require authentication to exploit the vulnerability.