CVE Vulnerabilities

CVE-2025-66277

Improper Link Resolution Before File Access ('Link Following')

Published: Feb 11, 2026 | Modified: Feb 12, 2026
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A link following vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to traverse the file system to unintended locations.

We have already fixed the vulnerability in the following versions: QTS 5.2.8.3350 build 20251216 and later QuTS hero h5.3.2.3354 build 20251225 and later QuTS hero h5.2.8.3350 build 20251216 and later

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

NameVendorStart VersionEnd Version
QtsQnap5.2.0.2737-build_20240417 (including)5.2.0.2737-build_20240417 (including)
QtsQnap5.2.0.2744-build_20240424 (including)5.2.0.2744-build_20240424 (including)
QtsQnap5.2.0.2782-build_20240601 (including)5.2.0.2782-build_20240601 (including)
QtsQnap5.2.0.2802-build_20240620 (including)5.2.0.2802-build_20240620 (including)
QtsQnap5.2.0.2823-build_20240711 (including)5.2.0.2823-build_20240711 (including)
QtsQnap5.2.0.2851-build_20240808 (including)5.2.0.2851-build_20240808 (including)
QtsQnap5.2.0.2860-build_20240817 (including)5.2.0.2860-build_20240817 (including)
QtsQnap5.2.1.2930-build_20241025 (including)5.2.1.2930-build_20241025 (including)
QtsQnap5.2.2.2950-build_20241114 (including)5.2.2.2950-build_20241114 (including)
QtsQnap5.2.3.3006-build_20250108 (including)5.2.3.3006-build_20250108 (including)
QtsQnap5.2.4.3070-build_20250312 (including)5.2.4.3070-build_20250312 (including)
QtsQnap5.2.4.3079-build_20250321 (including)5.2.4.3079-build_20250321 (including)
QtsQnap5.2.4.3092-build_20250403 (including)5.2.4.3092-build_20250403 (including)
QtsQnap5.2.5.3145-build_20250526 (including)5.2.5.3145-build_20250526 (including)
QtsQnap5.2.6.3195-build_20250715 (including)5.2.6.3195-build_20250715 (including)
QtsQnap5.2.6.3229-build_20250818 (including)5.2.6.3229-build_20250818 (including)
QtsQnap5.2.7.3256-build_20250913 (including)5.2.7.3256-build_20250913 (including)
QtsQnap5.2.7.3297-build_20251024 (including)5.2.7.3297-build_20251024 (including)
QtsQnap5.2.8.3332-build_20251128 (including)5.2.8.3332-build_20251128 (including)

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References