Exploiting (and Patching) a Zero Day RCE Vulnerability in a Western Digital NAS
In this video we show you how we found, exploited and patched a chain of zero day vulnerabilities in a Western Digital (WD) Network Attached Storage (NAS) device. This chain allows an unauthenticated attacker to execute code as root and install a permanent backdoor on the NAS.
0:00 Intro
0:41 Why Drop A Zero Day?
2:51 Overview Of WD PR4100 NAS
4:01 OS3 vs OS5
5:18 Recon And Password Cracking
7:02 API Introduction
8:45 Accessing Auth API (Vulnerability #1)
10:07 Firmware Update (Vulnerability #2)
15:48 Exploit Walkthrough
18:32 Exploit Execution
19:56 Patching Vulnerability #2
22:41 Downgrading OS5 To OS3
24:07 One Week Update
The vulnerabilities affect most of the WD NAS line-up and their OS3 firmware versions and are unpatched as of 2021/02/25. The new OS5 firmware is not vulnerable. OS3 is in a limbo, it’s not clear whether it is supported or not by WD, but WD’s official response to a security advisory in November 2020 seems to indicate that it’s out of support.
Please keep safe - do not expose your NA
1 view
221
52
2 weeks ago 00:06:17 1
Special report : Inside the Congo cobalt mines that exploit children
3 weeks ago 00:18:33 1
This Video Will Make You A Chess GENIUS…
1 month ago 00:56:25 1
Usury and the ONE Group Exploiting It | Matt Kim #131
1 month ago 00:17:12 2
“Bilderberg Group’s DARK SECRETS“ - Anneke Lucas REVEALS Billionaire’s In Sex Trafficking Network
1 month ago 01:56:28 2
“Trained As A Spy At 10” - Sex Trafficking Survivor Anneke Lucas NAMES Her Billionaire Abusers
1 month ago 00:57:17 4
My life after being sex trafficked by GirlsDoPorn Pt. 2 || Consider Before Consuming Podcast
1 month ago 01:03:33 1
I was sex trafficked by GirlsDoPorn Pt.1 || Consider Before Consuming Podcast