The ORICO NAS CD3510 (version V1.9.12 and below) contains an Incorrect Symlink Follow vulnerability that could be exploited by attackers to leak or tamper with the internal file system. Attackers can format a USB drive to ext4, create a symbolic link to its root directory, insert the drive into the NAS device's slot, then access the USB drive's symlink directory mounted on the NAS to obtain all files within the NAS system and tamper with those files.
References
| Link | Resource |
|---|---|
| https://www.notion.so/ORICO-NAS-Incorrect-Symlink-Follow-2c36cf4e528a80b7bf0be4dcac758419?source=copy_link | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-03 18:16
Updated : 2026-02-11 16:40
NVD link : CVE-2025-69429
Mitre link : CVE-2025-69429
CVE.ORG link : CVE-2025-69429
JSON object : View
Products Affected
orico
- cd3510
- cd3510_firmware
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
