An injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute commands via a network.
We have already fixed the vulnerability in the following versions: QTS 5.1.3.2578 build 20231110 and later QuTS hero h5.1.3.2578 build 20231110 and later QuTScloud c5.1.5.2651 and later
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Qts | Qnap | * | 5.1.3.2578 (excluding) |
Qts | Qnap | 5.1.3.2578 (including) | 5.1.3.2578 (including) |
Quts_hero | Qnap | * | h5.1.3.2578 (excluding) |
Quts_hero | Qnap | h5.1.3.2578 (including) | h5.1.3.2578 (including) |
Qutscloud | Qnap | * | c5.1.5.2651 (excluding) |