What are you looking for ?
IT Press Tour
RAIDON

QNAP Six Security Advisories on Multiple Resolved Vulnerabilities

Concerning QNAP Authenticator, Video Station App, Qsync Central, QTS and QuTS hero NAS OSs, and NetBak Replicator

QNAP Systems, Inc. had published security enhancement against security vulnerabilities that could affect specific versions of the company’s products.

Use the following information and solutions to correct the security issues and vulnerabilities.

This advisory includes following:

 

Vulnerability in QNAP Authenticator

Security ID: QSA-25-30
Release date: October 4, 2025
CVE identifier: CVE-2025-54153
Severity: Moderate
Status: Resolved
Affected products: QNAP Authenticator 1.3.x

Summary
An improper authentication vulnerability has been reported to affect QNAP Authenticator. If an attacker gains physical access to your device, they can then exploit the vulnerability to compromise the security of the system.

The company have already fixed the vulnerability in following version:

Affected Product

Fixed Version

QNAP Authenticator 1.3.x

QNAP Authenticator 1.3.1.1227 and later

  More information

 

Vulnerability in Video Station

Security ID: QSA-25-32
Release date: October 4, 2025
CVE identifier
: CVE-2024-56804
Severity: Important
Status: Resolved
Affected products: Video Station 5.8.x

Summary
An SQL injection vulnerability has been reported to affect Video Station. If a remote attacker gains access to a user account, they can then exploit the vulnerability to execute unauthorized code or commands.

The company have already fixed the vulnerability in following version:

Affected Product

Fixed Version

Video Station 5.8.x

Video Station 5.8.4 and later

More information

 

Multiple Vulnerabilities in Qsync Central

Security ID: QSA-25-34
Release date: October 4, 2025
CVE identifier: CVE-2025-33034 | CVE-2025-33039 | CVE-2025-33040 | CVE-2025-44006 | CVE-2025-44007 | CVE-2025-44008 | CVE-2025-44009 | CVE-2025-44010 | CVE-2025-44011 | CVE-2025-44014
Severity: Moderate
Status: Resolved
Affected products: Qsync Central 4.x

Summary
Multiple vulnerabilities have been reported to affect Qsync Central:

  • CVE-2025-33034: Path traversal vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.
  • CVE-2025-33039, CVE-2025-33040, CVE-2025-44006, CVE-2025-44007: Allocation of resources without limits or throttling vulnerabilities
    If a remote attacker gains access to a user account, they can then exploit the vulnerabilities to prevent other systems, applications, or processes from accessing the same type of resource.
  • CVE-2025-44008, CVE-2025-44009, CVE-2025-44010, CVE-2025-44011: NULL pointer dereference vulnerabilities
    If a remote attacker gains access to a user account, they can then exploit the vulnerabilities to launch a denial-of-service (DoS) attack.
  • CVE-2025-44014: Out-of-bounds write vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to modify or corrupt memory.

The company have already fixed the vulnerabilities in following version:

Affected Product

Fixed Version

Qsync Central 4.x

Qsync Central 5.0.0.1 (2025/07/09) and later

 More information

 

Multiple Vulnerabilities in Qsync Central

Security ID: QSA-25-35
Release date: October 4, 2025 CVE identifier: CVE-2025-44012 | CVE-2025-47210 | CVE-2025-52867 | CVE-2025-53595 | CVE-2025-54153
Severity: Important
Status: Resolved
Affected products: Qsync Central 5.0.0

Summary
Multiple vulnerabilities have been reported to affect Qsync Central:

  • CVE-2025-44012: Allocation of resources without limits or throttling vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.
  • CVE-2025-47210: NULL pointer dereference vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.
  • CVE-2025-52867: Uncontrolled resource consumption vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.
  • CVE-2025-53595, CVE-2025-54153: SQL injection vulnerabilities
    If a remote attacker gains access to a user account, they can then exploit the vulnerabilities to execute unauthorized code or commands.

The company have already fixed the vulnerabilities in following version:

Affected Product

Fixed Version

Qsync Central 5.0.0

Qsync Central 5.0.0.2 (2025/07/31) and later

More information

 

Multiple Vulnerabilities in QTS and QuTS hero

Security ID: QSA-25-36
Release date: October 4, 2025
CVE identifier: CVE-2025-47211 | CVE-2025-47212 | CVE-2025-47213 | CVE-2025-47214 | CVE-2025-48726 | CVE-2025-48727 | CVE-2025-48728 | CVE-2025-48729 | CVE-2025-48730 | CVE-2025-52424 | CVE-2025-52427 | CVE-2025-52428 | CVE-2025-52429 | CVE-2025-52432 | …
Severity: Moderate
Status: Resolved
Affected products: QTS 5.2.x, QuTS hero h5.2.x

Summary
Multiple vulnerabilities have been reported to affect certain QNAP OS versions:

  • CVE-2025-47211: Path traversal vulnerability
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data.
  • CVE-2025-47212: Command injection vulnerability
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to execute arbitrary commands.
  • CVE-2025-47213, CVE-2025-47214, CVE-2025-48726, CVE-2025-48727, CVE-2025-48728, CVE-2025-48729, CVE-2025-52424, CVE-2025-52427, CVE-2025-52428, CVE-2025-52432, CVE-2025-52433, CVE-2025-52853, CVE-2025-52854, CVE-2025-52855, CVE-2025-52857, CVE-2025-52858, CVE-2025-52859, CVE-2025-52860, CVE-2025-52862, CVE-2025-52866: NULL pointer dereference vulnerabilities
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerabilities to launch a denial-of-service (DoS) attack.
  • CVE-2025-48730, CVE-2025-52429, CVE-2025-53406, CVE-2025-53407: Use of externally-controlled format string vulnerabilities
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerabilities to obtain secret data or modify memory.

The company have already fixed the vulnerabilities in following versions:

Affected Product

Fixed Version

QTS 5.2.x

QTS 5.2.6.3195 build 20250715 and later

QuTS hero h5.2.x

QuTS hero h5.2.6.3195 build 20250715 and later

More information

 

Vulnerability in NetBak Replicator

Security ID: QSA-25-39
Release date: October 4, 2025
CVE identifier: CVE-2025-57714
Severity: Important
Status: Resolved
Affected product: NetBak Replicator 4.5.x

Summary
An unquoted search path or element vulnerability has been reported to affect NetBak Replicator. If a local attacker gains access to a user account, they can then exploit the vulnerability to execute unauthorized code or commands.

The company have already fixed the vulnerability in following version:

Affected Product

Fixed Version

NetBak Replicator 4.5.x

NetBak Replicator 4.5.15.0807 and later

More information  

Support: Questions regarding this issue

Articles_bottom
ExaGrid
AIC
ATTO
OPEN-E