CVE-2025-14107

A security flaw has been discovered in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this vulnerability is the function zfilev2_api.SafeStatus of the file /v2/file/safe/status of the component HTTP POST Request Handler. The manipulation of the argument safe_dir results in command injection. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure and confirmed the existence of the vulnerability. A technical fix is planned to be released.
References
Link Resource
https://vuldb.com/?ctiid.334489 Permissions Required VDB Entry
https://vuldb.com/?id.334489 Third Party Advisory VDB Entry
https://vuldb.com/?submit.697143 Third Party Advisory VDB Entry
https://www.notion.so/2af6cf4e528a8001935bcdd9e77f1ebc Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zspace:q2c_nas_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:zspace:q2c_nas:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-05 22:15

Updated : 2025-12-16 08:15


NVD link : CVE-2025-14107

Mitre link : CVE-2025-14107

CVE.ORG link : CVE-2025-14107


JSON object : View

Products Affected

zspace

  • q2c_nas
  • q2c_nas_firmware
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')