{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T00:41:51.103","vulnerabilities":[{"cve":{"id":"CVE-2025-69430","sourceIdentifier":"cve@mitre.org","published":"2026-02-03T18:16:16.817","lastModified":"2026-02-11T16:34:28.093","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An Incorrect Symlink Follow vulnerability exists in multiple Yottamaster NAS devices, including DM2 (version equal to or prior to V1.9.12), DM3 (version equal to or prior to V1.9.12), and DM200 (version equal to or prior to V1.2.23) that could be exploited by attackers to leak or tamper with the internal file system. Attackers can format a USB drive to ext4, create a symbolic link to its root directory, insert the drive into the NAS device's slot, then access the USB drive's symlink directory mounted on the NAS to obtain all files within the NAS system and tamper with those files."},{"lang":"es","value":"Una vulnerabilidad de seguimiento de enlace simbólico incorrecto existe en múltiples dispositivos NAS de Yottamaster, incluyendo DM2 (versión igual o anterior a V1.9.12), DM3 (versión igual o anterior a V1.9.12), y DM200 (versión igual o anterior a V1.2.23) que podría ser explotada por atacantes para filtrar o manipular el sistema de archivos interno. Los atacantes pueden formatear una unidad USB a ext4, crear un enlace simbólico a su directorio raíz, insertar la unidad en la ranura del dispositivo NAS, luego acceder al directorio de enlace simbólico de la unidad USB montado en el NAS para obtener todos los archivos dentro del sistema NAS y manipular esos archivos."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":5.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-59"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:yottamaster:dm2_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.9.12","matchCriteriaId":"26E4F17D-9089-4146-A0C0-DA48ADC7C71C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:yottamaster:dm2:-:*:*:*:*:*:*:*","matchCriteriaId":"BF6172E9-B80A-489C-970F-E0254724132A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:yottamaster:dm3_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.9.12","matchCriteriaId":"B9A6FCF0-2DCC-4751-96DA-9E026E6A1BDE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:yottamaster:dm3:-:*:*:*:*:*:*:*","matchCriteriaId":"1F0D4AB6-5016-4A21-BF67-AA71A973B5D7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:yottamaster:dm200_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.23","matchCriteriaId":"078B8015-705B-49C6-822A-4DB1A140A748"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:yottamaster:dm200:-:*:*:*:*:*:*:*","matchCriteriaId":"B568139C-FF61-4CF2-95B7-718517D0FF46"}]}]}],"references":[{"url":"https://www.notion.so/Yottamaster-Incorrect-Symlink-Follow-2c36cf4e528a8001b37cdad4be7431f8?source=copy_link","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]}]}}]}