📢 Unlock Exclusive Cyber Threat Intelligence
Powered by DarkWebInformer.com
Get foundational access to breach intelligence — track breaches, leaks, and threats in real-time with unfiltered screenshots and expert summaries.
⚠ Disclaimer
This report includes actual screenshots and/or text that may include unredacted personally identifiable information (PII) gathered from publicly available sources. The sensitive information presented within this report is intended solely for cybersecurity awareness and threat intelligence purposes. Dark Web Informer explicitly condemns unauthorized access, distribution, or misuse of the personal data displayed or referenced here. Users must treat exposed data responsibly and ethically.
📌 Overview
A threat actor operating under the alias skart7 has posted a listing offering a zero-day remote code execution (RCE) exploit targeting TerraMaster NAS devices. The exploit requires no authentication or user interaction, and is said to work on all versions of TOS 4 and TOS 5, including the latest releases. If real, this vulnerability could allow attackers to obtain full root access on affected devices remotely.
📊 Key Details
Attribute | Information |
---|---|
Date | 2025-06-02, 08:54:00 PM |
Threat Actor | skart7 |
Victim Country | China |
Industry | Computer & Network Security |
Organization | TerraMaster |
Victim Site | terra-master.com |
Category | Vulnerability |
Severity | Low (unconfirmed 0-day with unknown spread) |
Network | openweb |
Subscriber-only content…