### [CVE-2014-8687](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8687) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Seagate Business NAS devices with firmware before 2015.00322 allow remote attackers to execute arbitrary code with root privileges by leveraging use of a static encryption key to create session tokens. ### POC #### Reference - http://packetstormsecurity.com/files/130585/Seagate-Business-NAS-2014.00319-Remote-Code-Execution.html - http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html - https://beyondbinary.io/articles/seagate-nas-rce/ - https://www.exploit-db.com/exploits/36202/ - https://www.exploit-db.com/exploits/36264/ #### Github - https://github.com/dino213dz/sbar