[重要安全性通知] 发现假冒 Qfinder Pro 网站。了解详情 >

安全ID : QSA-26-03

Multiple Vulnerabilities in File Station 5


  • 发布日期 : February 12, 2026

  • 通用漏洞披露 : CVE-2025-54155 | CVE-2025-54161 | CVE-2025-54162 | CVE-2025-54163 | CVE-2025-54169 | CVE-2025-57707 | CVE-2025-57713 | CVE-2025-62853 | CVE-2025-62854 | CVE-2025-62855 | CVE-2025-62856 | CVE-2025-66278 | CVE-2026-22894

  • 受影响产品: File Station 5 version 5.5.x

严重程度

Important

状态

已解决


Summary

Multiple vulnerabilities have been reported to affect File Station 5:

  • CVE-2025-54155, CVE-2025-54161: Allocation of resources without limits or throttling vulnerability
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.
  • CVE-2025-54162: Path traversal vulnerability
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data.
  • CVE-2025-62853, CVE-2025-66278, CVE-2026-22894: Path traversal vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.
  • CVE-2025-62855, CVE-2025-62856: Path traversal vulnerability
    If a local attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data.
  • CVE-2025-54163: NULL pointer dereference vulnerability
    If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.
  • CVE-2025-54169: Out-of-bounds read vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to obtain secret data.
  • CVE-2025-57707: Improper neutralization of directives in statically saved code (static code injection) vulnerability
    If a remote attacker gains access to a user account, they can then exploit the vulnerability to access restricted data or files.
  • CVE-2025-57713: Weak authentication vulnerability
    If exploited, remote attackers can gain sensitive information.
  • CVE-2025-62854: Uncontrolled resource consumption vulnerability
    If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.

  

We have already fixed the vulnerabilities in the following version:

Affected Product Fixed Version
File Station 5 version 5.5.x File Station 5 version 5.5.6.5190 and later

Recommendation

To fix the vulnerabilities, we recommend updating File Station 5 to the latest version.

Updating File Station 5

  1. Log on to QTS or QuTS hero as an administrator.
  2. Open App Center and then click .
    A search box appears.
  3. Type "File Station 5" and then press ENTER.
    File Station 5 appears in the search results.
  4. Click Update.
    A confirmation message appears.
    Note: The Update button is not available if your File Station 5 is already up to date.
  5. Click OK.
    The system updates the application.

  

附件

致谢:
coral
Kutay Ergen
Mohammad Abdullah - Infosec Researcher & Bugbounty hunter

修订历史:
V1.0 (February 12, 2026) - Published

选择规格

      显示更多 隐藏更多
      open menu
      back to top