### [CVE-2020-28971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28971) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie, because of insufficient validation of URI paths. ### POC #### Reference - https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115 - https://www.westerndigital.com/support/productsecurity/wdc-20009-os5-firmware-5-06-115 #### Github No PoCs found on GitHub currently.