Synology BeeStation Vulnerabilities: Full System Takeover

Cyber Security News by CyberSum.net
2 sources
Security researcher Kiddo demonstrated a sophisticated exploit chain combining three distinct vulnerabilities to fully compromise Synology BeeStation devices. Presented at Pwn2Own 2024, the attack leverages a 'Dirty File Write' technique to bypass standard web shell methods and achieve root privileges. The exploit involves CRLF injection, improper authentication, and SQL injection, culminating in a complete system takeover. Synology has addressed these issues in the latest updates.