What are you looking for ?
itpresstour
RAIDON

QNAP: Seven Security Advisories on Resolved Vunerabilities

Concerning Media Streaming add-on, Qsync Central, File Station 5, Apache, QTS and QuTS hero NAS OSs, and Samba

QNAP Systems, Inc. had published security enhancement against security vulnerabilities that could affect specific versions of QNAP products.

Use the following information and solutions to correct the security issues and vulnerabilities.

This advisory includes following:

Multiple Vulnerabilities in Media Streaming add-on      
Security ID: QSA-25-57
Release date: February 12, 2026
CVE identifier: CVE-2024-56807 | CVE-2024-56808
Severity: Moderate
Status: Resolved
Affected products: Media Streaming add-on 500.1.x

Summary
Multiple vulnerabilities have been reported to affect Media Streaming add-on:

  • CVE-2024-56807: Out-of-bounds read vulnerability
    If an attacker gains access to the local network, they can then exploit the vulnerability to obtain secret data.

  • CVE-2024-56808: Command injection vulnerability
    If an attacker gains access to the local network and a user account, they can then exploit the vulnerability to execute arbitrary commands

The company have already fixed the vulnerabilities in following version:

Affected Product

Fixed Version

Media Streaming add-on 500.1.x

Media Streaming add-on 500.1.1.6 (2024/08/02) and later

More information

Multiple Vulnerabilities in Qsync Central     
Security ID: QSA-26-02
Release date: February 12, 2026
CVE identifier: CVE-2025-30269 | CVE-2025-30276 | CVE-2025-47209 | CVE-2025-48722 | CVE-2025-48723 | CVE-2025-48724 | CVE-2025-52868 | CVE-2025-52869 | CVE-2025-52870 | CVE-2025-53598 | CVE-2025-54146 | CVE-2025-54147 | CVE-2025-54148 | CVE-2025-54149 | CVE-2025-54150..
Severity: Moderate
Status: Resolved
Affected products: Qsync Central 5.0.x

Summary
Multiple vulnerabilities have been reported to affect Qsync Central:

  • CVE-2025-30269: Use of externally-controlled format string vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to obtain secret data or modify memory

  • CVE-2025-54170: Out-of-bounds read vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to obtain secret data

  • CVE-2025-30276: Out-of-bounds write vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to modify or corrupt memory

  • CVE-2025-47209, CVE-2025-48722, CVE-2025-53598, CVE-2025-54146, CVE-2025-54147, CVE-2025-54148, CVE-2025-58472, CVE-2025-30266: NULL pointer dereference vulnerabilities
    If a remote attacker gains access to a user account, they can then exploit the vulnerabilities to launch a denial-of-service (DoS) attack

  • CVE-2025-48723, CVE-2025-48724, CVE-2025-52868, CVE-2025-52869, CVE-2025-52870, CVE-2025-57709: Buffer overflow vulnerabilities
    If a remote attacker gains access to a user account, they can then exploit the vulnerabilities to modify memory or crash processes

  • CVE-2025-54149, CVE-2025-54150, CVE-2025-54151: Uncontrolled resource consumption vulnerabilities
    If a local attacker gains access to a user account, they can then exploit the vulnerabilities to launch a denial-of-service (DoS) attack

  • CVE-2025-54152: Out-of-range pointer offset vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to read sensitive portions of memory

  • CVE-2025-57708, CVE-2025-57710, CVE-2025-57711, CVE-2025-58471: Allocation of resources without limits or throttling vulnerabilities
    If a remote attacker gains access to a user account, they can then exploit the vulnerabilities to prevent other systems, applications, or processes from accessing the same type of resource

  • CVE-2025-58467, CVE-2025-58470, CVE-2025-68406: Relative path traversal vulnerabilities
    If a remote attacker gains access to a user account, they can then exploit the vulnerabilities to read the contents of unexpected files or system data

The company have already fixed the vulnerabilities in following version:

Affected Product

Fixed Version

Qsync Central 5.0.x

Qsync Central 5.0.0.4 (2026/01/20) and later

More information

Multiple Vulnerabilities in File Station 5          
Security ID: QSA-26-03
Release date: February 12, 2026
CVE identifier: CVE-2025-54155 | CVE-2025-54161 | CVE-2025-54162 | CVE-2025-54163 | CVE-2025-54169 | CVE-2025-57707 | CVE-2025-57713 | CVE-2025-62853 | CVE-2025-62854 | CVE-2025-62855 | CVE-2025-62856 | CVE-2025-66278 | CVE-2026-22894
Severity: Important
Status: Resolved
Affected products: File Station 5 version 5.5.x

Summary
Multiple vulnerabilities have been reported to affect File Station 5:

  • CVE-2025-54155, CVE-2025-54161: Allocation of resources without limits or throttling vulnerability
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource

  • CVE-2025-54162: Path traversal vulnerability
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data

  • CVE-2025-62853, CVE-2025-66278, CVE-2026-22894: Path traversal vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data

  • CVE-2025-62855, CVE-2025-62856: Path traversal vulnerability
    If a local attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data

  • CVE-2025-54163: NULL pointer dereference vulnerability
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack

  • CVE-2025-54169: Out-of-bounds read vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to obtain secret data

  • CVE-2025-57707: Improper neutralization of directives in statically saved code (static code injection) vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to access restricted data or files

  • CVE-2025-57713: Weak authentication vulnerability
    If exploited, remote attackers can gain sensitive information

  • CVE-2025-62854: Uncontrolled resource consumption vulnerability
    If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack

The company have already fixed the vulnerabilities in following version:

Affected Product

Fixed Version

File Station 5 version 5.5.x

File Station 5 version 5.5.6.5190 and later

More information

Vulnerabilities in Apache    
Security ID: QSA-26-04
Release date: February 12, 2026
CVE identifier: CVE-2024-42516 | CVE-2024-43204 | CVE-2024-43394 | CVE-2024-47252 | CVE-2025-23048 | CVE-2025-49630 | CVE-2025-49812 | CVE-2025-53020 | CVE-2025-54090
Severity: Moderate
Status: Resolved
Affected products: QTS 5.2.x; QuTS hero h5.2.x, h5.3.x

Summary
Multiple vulnerabilities have been reported in Apache, affecting certain QNAP OSs versions.

The company have already fixed the vulnerabilities in following versions:

Affected Product

Fixed Version

QTS 5.2.x

QTS 5.2.8.3332 build 20251128 and later

QuTS hero h5.2.x

QuTS hero h5.2.8.3321 build 20251117 and later

QuTS hero h5.3.x

QuTS hero h5.3.2.3354 build 20251225 and later

More information 

Multiple Vulnerabilities in QTS and QuTS hero    
Security ID: QSA-26-05
Release date: February 12, 2026
CVE identifier: CVE-2025-47205 | CVE-2025-58466 | CVE-2025-66277
Severity: Important
Status: Resolved
Affected products: QTS 5.2.x, QuTS hero h5.2.x

Summary
Multiple vulnerabilities has been reported to affect certain QNAP OSs versions:

  • CVE-2025-58466: Use of uninitialized variable vulnerability
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to cause denial-of-service (DoS) conditions or modify control flow in unexpected ways

  • CVE-2025-47205: NULL pointer dereference vulnerability
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack

  • CVE-2025-66277: Link following vulnerability
    If exploited, remote attackers can traverse the file system to unintended locations

The company have already fixed the vulnerabilities in following versions:

Affected Product

Fixed Version

QTS 5.2.x

QTS 5.2.8.3350 build 20251216 and later

QuTS hero h5.2.x

QuTS hero h5.2.8.3350 build 20251216 and later

More information

Vulnerabilities in Samba    
Security ID: QSA-26-06
Release date: February 12, 2026
CVE identifier: CVE-2025-10230 | CVE-2025-9640
Severity: Moderate
Status: Resolved
Affected products: QTS 5.2.x; QuTS hero h5.2.x, h5.3.x

Summary
Multiple vulnerabilities have been reported in Samba, affecting certain QNAP
OSs versions.

The company have already fixed the vulnerabilities in following versions:

Affected Product

Fixed Version

QTS 5.2.x

QTS 5.2.8.3332 build 20251128 and later

QuTS hero h5.2.x

QuTS hero h5.2.8.3321 build 20251117 and later

QuTS hero h5.3.x

QuTS hero h5.3.2.3354 build 20251225 and later

More information

Multiple Vulnerabilities in QuTS hero    
Security ID: QSA-26-08
Release date: February 12, 2026
CVE identifier: CVE-2025-48725 | CVE-2025-59386 | CVE-2025-66274
Severity: Low
Status: Resolved
Affected products: QuTS hero h5.3.x

Summary
Multiple vulnerabilities have been reported to affect QuTS hero:

  • CVE-2025-48725: Buffer overflow vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to modify memory or crash processes.

  • CVE-2025-66274, CVE-2025-59386: NULL pointer dereference vulnerability
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.

The company have already fixed the vulnerabilities in following version:

Affected Product

Fixed Version

QuTS hero h5.3.x

QuTS hero h5.3.2.3354 build 20251225 and later

More information

Questions regarding this issue

Articles_bottom
SNL Awards_2026
AIC