安全ID : QSA-25-36
Multiple Vulnerabilities in QTS and QuTS hero
发布日期 : October 4, 2025
通用漏洞披露 : CVE-2025-47211 | CVE-2025-47212 | CVE-2025-47213 | CVE-2025-47214 | CVE-2025-48726 | CVE-2025-48727 | CVE-2025-48728 | CVE-2025-48729 | CVE-2025-48730 | CVE-2025-52424 | CVE-2025-52427 | CVE-2025-52428 | CVE-2025-52429 | CVE-2025-52432 | ...
受影响产品: QTS 5.2.x, QuTS hero h5.2.x
严重程度
Moderate
状态
已解决
Summary
Multiple vulnerabilities have been reported to affect certain QNAP operating system versions:
- CVE-2025-47211: Path traversal vulnerability
If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data. - CVE-2025-47212: Command injection vulnerability
If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to execute arbitrary commands. - CVE-2025-47213, CVE-2025-47214, CVE-2025-48726, CVE-2025-48727, CVE-2025-48728, CVE-2025-48729, CVE-2025-52424, CVE-2025-52427, CVE-2025-52428, CVE-2025-52432, CVE-2025-52433, CVE-2025-52853, CVE-2025-52854, CVE-2025-52855, CVE-2025-52857, CVE-2025-52858, CVE-2025-52859, CVE-2025-52860, CVE-2025-52862, CVE-2025-52866: NULL pointer dereference vulnerabilities
If a remote attacker gains access to an administrator account, they can then exploit the vulnerabilities to launch a denial-of-service (DoS) attack. - CVE-2025-48730, CVE-2025-52429, CVE-2025-53406, CVE-2025-53407: Use of externally-controlled format string vulnerabilities
If a remote attacker gains access to an administrator account, they can then exploit the vulnerabilities to obtain secret data or modify memory.
We have already fixed the vulnerabilities in the following versions:
Affected Product | Fixed Version |
QTS 5.2.x | QTS 5.2.6.3195 build 20250715 and later |
QuTS hero h5.2.x | QuTS hero h5.2.6.3195 build 20250715 and later |
Recommendation
To secure your device, we recommend regularly updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.
Updating QTS or QuTS hero
- Log in to QTS or QuTS hero as an administrator.
- Go to Control Panel > System > Firmware Update.
- Under Live Update, click Check for Update.
The system downloads and installs the latest available update.
Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.
附件
- CVE-2025-47211.json
- CVE-2025-47212.json
- CVE-2025-47213.json
- CVE-2025-47214.json
- CVE-2025-48726.json
- CVE-2025-48727.json
- CVE-2025-48728.json
- CVE-2025-48729.json
- CVE-2025-48730.json
- CVE-2025-52424.json
- CVE-2025-52427.json
- CVE-2025-52428.json
- CVE-2025-52429.json
- CVE-2025-52433.json
- CVE-2025-52853.json
- CVE-2025-52854.json
- CVE-2025-52855.json
- CVE-2025-52857.json
- CVE-2025-52858.json
- CVE-2025-52859.json
- CVE-2025-52860.json
- CVE-2025-52862.json
- CVE-2025-52866.json
- CVE-2025-53406.json
- CVE-2025-53407.json
- CVE-2025-52432.json
致谢: coral, Yuze Wu(h1J4cker),
修订历史:
V1.0 (October 4, 2025) - Published