Search criteria

22 vulnerabilities found for QuRouter by Qnap

VAR-202506-2751

Vulnerability from variot - Updated: 2025-10-04 23:24

An improper authentication vulnerability has been reported to affect QHora. If an attacker gains local network access, they can then exploit the vulnerability to compromise the security of the system.

We have already fixed the vulnerability in the following version: QuRouter 2.5.0.140 and later. QNAP Systems of QuRouter There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. QNAP QHora is a router from Taiwan's QNAP Technology Co., Ltd. No detailed vulnerability details are currently available

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202506-2751",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.0.190"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.5.032"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.1.634"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.1.172"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.6.028"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.3.103"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.2.317"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.4.106"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.2.538"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "qnap",
        "version": null
      },
      {
        "model": "qurouter",
        "scope": null,
        "trust": 0.8,
        "vendor": "qnap",
        "version": null
      },
      {
        "model": "qhora",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "qnap",
        "version": "2.5.0.140"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-15408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028326"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13088"
      }
    ]
  },
  "cve": "CVE-2024-13088",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.1,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2025-15408",
            "impactScore": 8.5,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.8,
            "id": "CVE-2024-13088",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2024-13088",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2024-13088",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "security@qnapsecurity.com.tw",
            "id": "CVE-2024-13088",
            "trust": 1.0,
            "value": "Medium"
          },
          {
            "author": "NVD",
            "id": "CVE-2024-13088",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2025-15408",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-15408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028326"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13088"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13088"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "An improper authentication vulnerability has been reported to affect QHora. If an attacker gains local network access, they can then exploit the vulnerability to compromise the security of the system. \n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.5.0.140 and later. QNAP Systems of QuRouter There is an authentication vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. QNAP QHora is a router from Taiwan\u0027s QNAP Technology Co., Ltd. No detailed vulnerability details are currently available",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-13088"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028326"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-15408"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-13088",
        "trust": 3.2
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028326",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-15408",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-15408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028326"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13088"
      }
    ]
  },
  "id": "VAR-202506-2751",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-15408"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-15408"
      }
    ]
  },
  "last_update_date": "2025-10-04T23:24:17.994000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Patch for QNAP QHora Authorization Issue Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/706246"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-15408"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.0
      },
      {
        "problemtype": "Inappropriate authentication (CWE-287) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028326"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13088"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.qnap.com/en/security-advisory/qsa-25-15"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-13088"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-15408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028326"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13088"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-15408"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028326"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13088"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-07-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2025-15408"
      },
      {
        "date": "2025-10-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-028326"
      },
      {
        "date": "2025-06-06T16:15:23.323000",
        "db": "NVD",
        "id": "CVE-2024-13088"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-07-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2025-15408"
      },
      {
        "date": "2025-10-02T08:57:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-028326"
      },
      {
        "date": "2025-09-24T20:32:05.373000",
        "db": "NVD",
        "id": "CVE-2024-13088"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "QNAP\u00a0Systems\u00a0 of \u00a0QuRouter\u00a0 Authentication vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028326"
      }
    ],
    "trust": 0.8
  }
}

VAR-202506-2348

Vulnerability from variot - Updated: 2025-10-03 23:32

A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to execute arbitrary commands.

We have already fixed the vulnerability in the following version: QuRouter 2.4.6.028 and later. QNAP Systems of QuRouter for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of QNAP QHora-322 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the miro_webserver_lib_RunExecBash function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. QNAP QHora is a router from Taiwan's QNAP Technology Co., Ltd. The vulnerability is caused by the application's failure to properly filter special characters and commands in constructing commands. No detailed vulnerability details are currently available

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202506-2348",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.5.032"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.1.634"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.3.103"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.2.538"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.4.106"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.6.028"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.1.172"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.0.190"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "qnap",
        "version": "2.4.2.317"
      },
      {
        "model": "qurouter",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "qnap",
        "version": null
      },
      {
        "model": "qurouter",
        "scope": null,
        "trust": 0.8,
        "vendor": "qnap",
        "version": null
      },
      {
        "model": "qhora-322",
        "scope": null,
        "trust": 0.7,
        "vendor": "qnap",
        "version": null
      },
      {
        "model": "qhora",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "qnap",
        "version": "2.4.6.028"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-25-871"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-15407"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028279"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13087"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "nella17 (@nella17tw), working with DEVCORE Internship Program, and DEVCORE Research Team",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-25-871"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2024-13087",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "MULTIPLE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 2.5,
            "id": "CNVD-2025-15407",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:M/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.8,
            "id": "CVE-2024-13087",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Local",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 6.7,
            "baseSeverity": "Medium",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2024-13087",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT",
            "author": "ZDI",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 1.2,
            "id": "CVE-2024-13087",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 0.7,
            "userInteraction": "NONE",
            "vectorString": "AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2024-13087",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "security@qnapsecurity.com.tw",
            "id": "CVE-2024-13087",
            "trust": 1.0,
            "value": "Low"
          },
          {
            "author": "NVD",
            "id": "CVE-2024-13087",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "ZDI",
            "id": "CVE-2024-13087",
            "trust": 0.7,
            "value": "HIGH"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2025-15407",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-25-871"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-15407"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028279"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13087"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13087"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to execute arbitrary commands. \n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later. QNAP Systems of QuRouter for, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of QNAP QHora-322 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.The specific flaw exists within the miro_webserver_lib_RunExecBash function. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. QNAP QHora is a router from Taiwan\u0027s QNAP Technology Co., Ltd. The vulnerability is caused by the application\u0027s failure to properly filter special characters and commands in constructing commands. No detailed vulnerability details are currently available",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2024-13087"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028279"
      },
      {
        "db": "ZDI",
        "id": "ZDI-25-871"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-15407"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2024-13087",
        "trust": 3.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028279",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-25847",
        "trust": 0.7
      },
      {
        "db": "ZDI",
        "id": "ZDI-25-871",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-15407",
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-25-871"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-15407"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028279"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13087"
      }
    ]
  },
  "id": "VAR-202506-2348",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-15407"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2025-15407"
      }
    ]
  },
  "last_update_date": "2025-10-03T23:32:49.852000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "QNAP has issued an update to correct this vulnerability.",
        "trust": 0.7,
        "url": "https://www.qnap.com/en/security-advisory/qsa-25-15"
      },
      {
        "title": "Patch for QNAP QHora OS Command Injection Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/706231"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-25-871"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-15407"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-78",
        "trust": 1.0
      },
      {
        "problemtype": "OS Command injection (CWE-78) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028279"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13087"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://www.qnap.com/en/security-advisory/qsa-25-15"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2024-13087"
      }
    ],
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-25-871"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-15407"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028279"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13087"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-25-871"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2025-15407"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028279"
      },
      {
        "db": "NVD",
        "id": "CVE-2024-13087"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-08-26T00:00:00",
        "db": "ZDI",
        "id": "ZDI-25-871"
      },
      {
        "date": "2025-07-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2025-15407"
      },
      {
        "date": "2025-10-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-028279"
      },
      {
        "date": "2025-06-06T16:15:22.573000",
        "db": "NVD",
        "id": "CVE-2024-13087"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2025-08-26T00:00:00",
        "db": "ZDI",
        "id": "ZDI-25-871"
      },
      {
        "date": "2025-07-10T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2025-15407"
      },
      {
        "date": "2025-10-01T03:04:00",
        "db": "JVNDB",
        "id": "JVNDB-2024-028279"
      },
      {
        "date": "2025-09-24T20:32:32.280000",
        "db": "NVD",
        "id": "CVE-2024-13087"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "QNAP\u00a0Systems\u00a0 of \u00a0QuRouter\u00a0 In \u00a0OS\u00a0 Command injection vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2024-028279"
      }
    ],
    "trust": 0.8
  }
}

CVE-2025-29887 (GCVE-0-2025-29887)

Vulnerability from nvd – Published: 2025-08-29 17:14 – Updated: 2025-08-29 18:24
VLAI?
Title
QuRouter 2.5
Summary
A command injection vulnerability has been reported to affect QuRouter 2.5.1. If a remote attacker gains an administrator account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuRouter 2.5.1.060 and later
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.5.x , < 2.5.1.060 (custom)
Create a notification for this product.
Credits
Anonymous
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-29887",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-29T18:19:28.104348Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-29T18:24:51.513Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.5.1.060",
              "status": "affected",
              "version": "2.5.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Anonymous"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A command injection vulnerability has been reported to affect QuRouter 2.5.1. If a remote attacker gains an administrator account, they can then exploit the vulnerability to execute arbitrary commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.5.1.060 and later\u003cbr\u003e"
            }
          ],
          "value": "A command injection vulnerability has been reported to affect QuRouter 2.5.1. If a remote attacker gains an administrator account, they can then exploit the vulnerability to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.5.1.060 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "HIGH",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "ACTIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            },
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-29T17:14:32.736Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-25"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.5.1.060 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.5.1.060 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-25",
        "discovery": "EXTERNAL"
      },
      "title": "QuRouter 2.5",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2025-29887",
    "datePublished": "2025-08-29T17:14:32.736Z",
    "dateReserved": "2025-03-12T08:12:28.508Z",
    "dateUpdated": "2025-08-29T18:24:51.513Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-13088 (GCVE-0-2024-13088)

Vulnerability from nvd – Published: 2025-06-06 15:53 – Updated: 2025-06-06 16:35
VLAI?
Title
QHora
Summary
An improper authentication vulnerability has been reported to affect QHora. If an attacker gains local network access, they can then exploit the vulnerability to compromise the security of the system. We have already fixed the vulnerability in the following version: QuRouter 2.5.0.140 and later
CWE
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.5.x , < 2.5.0.140 (custom)
Create a notification for this product.
Credits
nella17 (@nella17tw), working with DEVCORE Internship Program, and DEVCORE Research Team working with Trend Micro Zero Day Initiative
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-13088",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-06T16:19:34.279680Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-06T16:35:46.679Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.5.0.140",
              "status": "affected",
              "version": "2.5.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "nella17 (@nella17tw), working with DEVCORE Internship Program, and DEVCORE Research Team working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An improper authentication vulnerability has been reported to affect QHora. If an attacker gains local network access, they can then exploit the vulnerability to compromise the security of the system.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.5.0.140 and later\u003cbr\u003e"
            }
          ],
          "value": "An improper authentication vulnerability has been reported to affect QHora. If an attacker gains local network access, they can then exploit the vulnerability to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.5.0.140 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "PHYSICAL",
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "CWE-287",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-06T15:53:09.479Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-15"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.5.0.140 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.5.0.140 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-15",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-13088",
    "datePublished": "2025-06-06T15:53:09.479Z",
    "dateReserved": "2024-12-31T09:31:40.415Z",
    "dateUpdated": "2025-06-06T16:35:46.679Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-13087 (GCVE-0-2024-13087)

Vulnerability from nvd – Published: 2025-06-06 15:53 – Updated: 2025-06-06 16:35
VLAI?
Title
QHora
Summary
A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuRouter 2.4.6.028 and later
CWE
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.6.028 (custom)
Create a notification for this product.
Credits
nella17 (@nella17tw), working with DEVCORE Internship Program, and DEVCORE Research Team working with Trend Micro Zero Day Initiative
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-13087",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-06T16:19:38.983594Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-06T16:35:52.407Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.6.028",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "nella17 (@nella17tw), working with DEVCORE Internship Program, and DEVCORE Research Team working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to execute arbitrary commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.6.028 and later\u003cbr\u003e"
            }
          ],
          "value": "A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "PHYSICAL",
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-06T15:53:04.614Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-15"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.6.028 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-15",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-13087",
    "datePublished": "2025-06-06T15:53:04.614Z",
    "dateReserved": "2024-12-31T09:31:37.789Z",
    "dateUpdated": "2025-06-06T16:35:52.407Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-53700 (GCVE-0-2024-53700)

Vulnerability from nvd – Published: 2025-03-07 16:14 – Updated: 2025-03-07 17:52
VLAI?
Title
QHora
Summary
A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuRouter 2.4.6.028 and later
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.6.028 (custom)
Create a notification for this product.
Credits
Freddo Espresso (Evangelos Daravigkas)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-53700",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-07T17:52:22.889510Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-07T17:52:31.620Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.6.028",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Freddo Espresso (Evangelos Daravigkas)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.6.028 and later\u003cbr\u003e"
            }
          ],
          "value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            },
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-07T16:14:22.908Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-07"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.6.028 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-07",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-53700",
    "datePublished": "2025-03-07T16:14:22.908Z",
    "dateReserved": "2024-11-22T06:21:49.207Z",
    "dateUpdated": "2025-03-07T17:52:31.620Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-50390 (GCVE-0-2024-50390)

Vulnerability from nvd – Published: 2025-03-07 16:13 – Updated: 2025-03-07 17:58
VLAI?
Title
QHora
Summary
A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuRouter 2.4.5.032 and later
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.5.032 (custom)
Create a notification for this product.
Credits
Pwn2Own 2024 - Daan Keuper (@daankeuper), Thijs Alkemade, and Khaled Nassar from Computest Sector 7
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-50390",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-07T17:58:02.771865Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-07T17:58:11.150Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.5.032",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Pwn2Own 2024 - Daan Keuper (@daankeuper),  Thijs Alkemade,  and Khaled Nassar from Computest Sector 7"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.5.032 and later\u003cbr\u003e"
            }
          ],
          "value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.5.032 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-176",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-176"
            }
          ]
        },
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1188",
              "description": "CWE-1188",
              "lang": "en",
              "type": "CWE"
            },
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-07T16:13:03.267Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-01"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.5.032 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.4.5.032 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-01",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-50390",
    "datePublished": "2025-03-07T16:13:03.267Z",
    "dateReserved": "2024-10-24T03:41:08.489Z",
    "dateUpdated": "2025-03-07T17:58:11.150Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-50389 (GCVE-0-2024-50389)

Vulnerability from nvd – Published: 2024-12-06 16:35 – Updated: 2024-12-06 19:39
VLAI?
Title
QuRouter
Summary
A SQL injection vulnerability has been reported to affect QuRouter. If exploited, the vulnerability could allow remote attackers to inject malicious code. We have already fixed the vulnerability in the following version: QuRouter 2.4.5.032 and later
CWE
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.5.032 (custom)
Create a notification for this product.
Credits
Pwn2Own 2024 - Viettel Cyber Security
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:qnap:qurouter:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "qurouter",
            "vendor": "qnap",
            "versions": [
              {
                "lessThan": "2.4.5.032",
                "status": "affected",
                "version": "2.4.x",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-50389",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-06T19:30:09.347353Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-06T19:39:20.514Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.5.032",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Pwn2Own 2024 - Viettel Cyber Security"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A SQL injection vulnerability has been reported to affect QuRouter. If exploited, the vulnerability could allow remote attackers to inject malicious code.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.5.032 and later\u003cbr\u003e"
            }
          ],
          "value": "A SQL injection vulnerability has been reported to affect QuRouter. If exploited, the vulnerability could allow remote attackers to inject malicious code.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.5.032 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-66",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-66"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 9.5,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-89",
              "description": "CWE-89",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-06T16:35:45.704Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-24-45"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.5.032 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.4.5.032 and later"
        }
      ],
      "source": {
        "advisory": "QSA-24-45",
        "discovery": "EXTERNAL"
      },
      "title": "QuRouter",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-50389",
    "datePublished": "2024-12-06T16:35:45.704Z",
    "dateReserved": "2024-10-24T03:41:08.489Z",
    "dateUpdated": "2024-12-06T19:39:20.514Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-48861 (GCVE-0-2024-48861)

Vulnerability from nvd – Published: 2024-11-22 15:32 – Updated: 2024-11-26 15:57
VLAI?
Title
QHora
Summary
An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local network attackers to execute commands. We have already fixed the vulnerability in the following versions: QuRouter 2.4.4.106 and later
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.4.106 (custom)
Create a notification for this product.
Credits
Midnight Blue / PHP Hooligans
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:qnap:qurouter:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "qurouter",
            "vendor": "qnap",
            "versions": [
              {
                "lessThan": "2.4.4.106",
                "status": "affected",
                "version": "2.4.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-48861",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-22T16:35:49.001964Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-26T15:57:56.198Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.4.106",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Midnight Blue / PHP Hooligans"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local network attackers to execute commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQuRouter 2.4.4.106 and later\u003cbr\u003e"
            }
          ],
          "value": "An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local network attackers to execute commands.\n\nWe have already fixed the vulnerability in the following versions:\nQuRouter 2.4.4.106 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "PHYSICAL",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            },
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-22T15:32:01.006Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-24-44"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQuRouter 2.4.4.106 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following versions:\nQuRouter 2.4.4.106 and later"
        }
      ],
      "source": {
        "advisory": "QSA-24-44",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-48861",
    "datePublished": "2024-11-22T15:32:01.006Z",
    "dateReserved": "2024-10-09T00:22:57.834Z",
    "dateUpdated": "2024-11-26T15:57:56.198Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-48860 (GCVE-0-2024-48860)

Vulnerability from nvd – Published: 2024-11-22 15:32 – Updated: 2024-11-22 16:39
VLAI?
Title
QHora
Summary
An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow remote attackers to execute commands. We have already fixed the vulnerability in the following version: QuRouter 2.4.3.103 and later
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.3.103 (custom)
Create a notification for this product.
Credits
Midnight Blue / PHP Hooligans
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:qnap:qurouter:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "qurouter",
            "vendor": "qnap",
            "versions": [
              {
                "lessThan": "2.4.3.103",
                "status": "affected",
                "version": "2.4.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-48860",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-22T16:39:38.535540Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-22T16:39:54.901Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.3.103",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Midnight Blue / PHP Hooligans"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow remote attackers to execute commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.3.103 and later\u003cbr\u003e"
            }
          ],
          "value": "An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow remote attackers to execute commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.3.103 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 9.5,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            },
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-22T15:32:07.455Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-24-44"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.3.103 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.4.3.103 and later"
        }
      ],
      "source": {
        "advisory": "QSA-24-44",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-48860",
    "datePublished": "2024-11-22T15:32:07.455Z",
    "dateReserved": "2024-10-09T00:22:57.834Z",
    "dateUpdated": "2024-11-22T16:39:54.901Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-29887 (GCVE-0-2025-29887)

Vulnerability from cvelistv5 – Published: 2025-08-29 17:14 – Updated: 2025-08-29 18:24
VLAI?
Title
QuRouter 2.5
Summary
A command injection vulnerability has been reported to affect QuRouter 2.5.1. If a remote attacker gains an administrator account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuRouter 2.5.1.060 and later
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.5.x , < 2.5.1.060 (custom)
Create a notification for this product.
Credits
Anonymous
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-29887",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-29T18:19:28.104348Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-29T18:24:51.513Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.5.1.060",
              "status": "affected",
              "version": "2.5.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Anonymous"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A command injection vulnerability has been reported to affect QuRouter 2.5.1. If a remote attacker gains an administrator account, they can then exploit the vulnerability to execute arbitrary commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.5.1.060 and later\u003cbr\u003e"
            }
          ],
          "value": "A command injection vulnerability has been reported to affect QuRouter 2.5.1. If a remote attacker gains an administrator account, they can then exploit the vulnerability to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.5.1.060 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "HIGH",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "ACTIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            },
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-29T17:14:32.736Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-25"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.5.1.060 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.5.1.060 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-25",
        "discovery": "EXTERNAL"
      },
      "title": "QuRouter 2.5",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2025-29887",
    "datePublished": "2025-08-29T17:14:32.736Z",
    "dateReserved": "2025-03-12T08:12:28.508Z",
    "dateUpdated": "2025-08-29T18:24:51.513Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-13088 (GCVE-0-2024-13088)

Vulnerability from cvelistv5 – Published: 2025-06-06 15:53 – Updated: 2025-06-06 16:35
VLAI?
Title
QHora
Summary
An improper authentication vulnerability has been reported to affect QHora. If an attacker gains local network access, they can then exploit the vulnerability to compromise the security of the system. We have already fixed the vulnerability in the following version: QuRouter 2.5.0.140 and later
CWE
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.5.x , < 2.5.0.140 (custom)
Create a notification for this product.
Credits
nella17 (@nella17tw), working with DEVCORE Internship Program, and DEVCORE Research Team working with Trend Micro Zero Day Initiative
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-13088",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-06T16:19:34.279680Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-06T16:35:46.679Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.5.0.140",
              "status": "affected",
              "version": "2.5.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "nella17 (@nella17tw), working with DEVCORE Internship Program, and DEVCORE Research Team working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An improper authentication vulnerability has been reported to affect QHora. If an attacker gains local network access, they can then exploit the vulnerability to compromise the security of the system.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.5.0.140 and later\u003cbr\u003e"
            }
          ],
          "value": "An improper authentication vulnerability has been reported to affect QHora. If an attacker gains local network access, they can then exploit the vulnerability to compromise the security of the system.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.5.0.140 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "PHYSICAL",
            "baseScore": 5.2,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-287",
              "description": "CWE-287",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-06T15:53:09.479Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-15"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.5.0.140 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.5.0.140 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-15",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-13088",
    "datePublished": "2025-06-06T15:53:09.479Z",
    "dateReserved": "2024-12-31T09:31:40.415Z",
    "dateUpdated": "2025-06-06T16:35:46.679Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-13087 (GCVE-0-2024-13087)

Vulnerability from cvelistv5 – Published: 2025-06-06 15:53 – Updated: 2025-06-06 16:35
VLAI?
Title
QHora
Summary
A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuRouter 2.4.6.028 and later
CWE
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.6.028 (custom)
Create a notification for this product.
Credits
nella17 (@nella17tw), working with DEVCORE Internship Program, and DEVCORE Research Team working with Trend Micro Zero Day Initiative
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-13087",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-06T16:19:38.983594Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-06T16:35:52.407Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.6.028",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "nella17 (@nella17tw), working with DEVCORE Internship Program, and DEVCORE Research Team working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to execute arbitrary commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.6.028 and later\u003cbr\u003e"
            }
          ],
          "value": "A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "PHYSICAL",
            "baseScore": 2.4,
            "baseSeverity": "LOW",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "LOW",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-06T15:53:04.614Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-15"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.6.028 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-15",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-13087",
    "datePublished": "2025-06-06T15:53:04.614Z",
    "dateReserved": "2024-12-31T09:31:37.789Z",
    "dateUpdated": "2025-06-06T16:35:52.407Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-53700 (GCVE-0-2024-53700)

Vulnerability from cvelistv5 – Published: 2025-03-07 16:14 – Updated: 2025-03-07 17:52
VLAI?
Title
QHora
Summary
A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuRouter 2.4.6.028 and later
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.6.028 (custom)
Create a notification for this product.
Credits
Freddo Espresso (Evangelos Daravigkas)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-53700",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-07T17:52:22.889510Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-07T17:52:31.620Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.6.028",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Freddo Espresso (Evangelos Daravigkas)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.6.028 and later\u003cbr\u003e"
            }
          ],
          "value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            },
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-07T16:14:22.908Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-07"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.6.028 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.4.6.028 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-07",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-53700",
    "datePublished": "2025-03-07T16:14:22.908Z",
    "dateReserved": "2024-11-22T06:21:49.207Z",
    "dateUpdated": "2025-03-07T17:52:31.620Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-50390 (GCVE-0-2024-50390)

Vulnerability from cvelistv5 – Published: 2025-03-07 16:13 – Updated: 2025-03-07 17:58
VLAI?
Title
QHora
Summary
A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuRouter 2.4.5.032 and later
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.5.032 (custom)
Create a notification for this product.
Credits
Pwn2Own 2024 - Daan Keuper (@daankeuper), Thijs Alkemade, and Khaled Nassar from Computest Sector 7
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-50390",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-07T17:58:02.771865Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-07T17:58:11.150Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.5.032",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Pwn2Own 2024 - Daan Keuper (@daankeuper),  Thijs Alkemade,  and Khaled Nassar from Computest Sector 7"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.5.032 and later\u003cbr\u003e"
            }
          ],
          "value": "A command injection vulnerability has been reported to affect QHora. If exploited, the vulnerability could allow remote attackers to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.5.032 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-176",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-176"
            }
          ]
        },
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "PASSIVE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1188",
              "description": "CWE-1188",
              "lang": "en",
              "type": "CWE"
            },
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-07T16:13:03.267Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-25-01"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.5.032 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.4.5.032 and later"
        }
      ],
      "source": {
        "advisory": "QSA-25-01",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-50390",
    "datePublished": "2025-03-07T16:13:03.267Z",
    "dateReserved": "2024-10-24T03:41:08.489Z",
    "dateUpdated": "2025-03-07T17:58:11.150Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-50389 (GCVE-0-2024-50389)

Vulnerability from cvelistv5 – Published: 2024-12-06 16:35 – Updated: 2024-12-06 19:39
VLAI?
Title
QuRouter
Summary
A SQL injection vulnerability has been reported to affect QuRouter. If exploited, the vulnerability could allow remote attackers to inject malicious code. We have already fixed the vulnerability in the following version: QuRouter 2.4.5.032 and later
CWE
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.5.032 (custom)
Create a notification for this product.
Credits
Pwn2Own 2024 - Viettel Cyber Security
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:qnap:qurouter:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "qurouter",
            "vendor": "qnap",
            "versions": [
              {
                "lessThan": "2.4.5.032",
                "status": "affected",
                "version": "2.4.x",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-50389",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-06T19:30:09.347353Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-06T19:39:20.514Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.5.032",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Pwn2Own 2024 - Viettel Cyber Security"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A SQL injection vulnerability has been reported to affect QuRouter. If exploited, the vulnerability could allow remote attackers to inject malicious code.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.5.032 and later\u003cbr\u003e"
            }
          ],
          "value": "A SQL injection vulnerability has been reported to affect QuRouter. If exploited, the vulnerability could allow remote attackers to inject malicious code.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.5.032 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-66",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-66"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 9.5,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-89",
              "description": "CWE-89",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-06T16:35:45.704Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-24-45"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.5.032 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.4.5.032 and later"
        }
      ],
      "source": {
        "advisory": "QSA-24-45",
        "discovery": "EXTERNAL"
      },
      "title": "QuRouter",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-50389",
    "datePublished": "2024-12-06T16:35:45.704Z",
    "dateReserved": "2024-10-24T03:41:08.489Z",
    "dateUpdated": "2024-12-06T19:39:20.514Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-48860 (GCVE-0-2024-48860)

Vulnerability from cvelistv5 – Published: 2024-11-22 15:32 – Updated: 2024-11-22 16:39
VLAI?
Title
QHora
Summary
An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow remote attackers to execute commands. We have already fixed the vulnerability in the following version: QuRouter 2.4.3.103 and later
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.3.103 (custom)
Create a notification for this product.
Credits
Midnight Blue / PHP Hooligans
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:qnap:qurouter:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "qurouter",
            "vendor": "qnap",
            "versions": [
              {
                "lessThan": "2.4.3.103",
                "status": "affected",
                "version": "2.4.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-48860",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-22T16:39:38.535540Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-22T16:39:54.901Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.3.103",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Midnight Blue / PHP Hooligans"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow remote attackers to execute commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.3.103 and later\u003cbr\u003e"
            }
          ],
          "value": "An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow remote attackers to execute commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.3.103 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "NETWORK",
            "baseScore": 9.5,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            },
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-22T15:32:07.455Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-24-44"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following version:\u003cbr\u003eQuRouter 2.4.3.103 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following version:\nQuRouter 2.4.3.103 and later"
        }
      ],
      "source": {
        "advisory": "QSA-24-44",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-48860",
    "datePublished": "2024-11-22T15:32:07.455Z",
    "dateReserved": "2024-10-09T00:22:57.834Z",
    "dateUpdated": "2024-11-22T16:39:54.901Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-48861 (GCVE-0-2024-48861)

Vulnerability from cvelistv5 – Published: 2024-11-22 15:32 – Updated: 2024-11-26 15:57
VLAI?
Title
QHora
Summary
An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local network attackers to execute commands. We have already fixed the vulnerability in the following versions: QuRouter 2.4.4.106 and later
Assigner
Impacted products
Vendor Product Version
QNAP Systems Inc. QuRouter Affected: 2.4.x , < 2.4.4.106 (custom)
Create a notification for this product.
Credits
Midnight Blue / PHP Hooligans
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:qnap:qurouter:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "qurouter",
            "vendor": "qnap",
            "versions": [
              {
                "lessThan": "2.4.4.106",
                "status": "affected",
                "version": "2.4.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-48861",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-22T16:35:49.001964Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-26T15:57:56.198Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "QuRouter",
          "vendor": "QNAP Systems Inc.",
          "versions": [
            {
              "lessThan": "2.4.4.106",
              "status": "affected",
              "version": "2.4.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Midnight Blue / PHP Hooligans"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local network attackers to execute commands.\u003cbr\u003e\u003cbr\u003eWe have already fixed the vulnerability in the following versions:\u003cbr\u003eQuRouter 2.4.4.106 and later\u003cbr\u003e"
            }
          ],
          "value": "An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow local network attackers to execute commands.\n\nWe have already fixed the vulnerability in the following versions:\nQuRouter 2.4.4.106 and later"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "PRESENT",
            "attackVector": "PHYSICAL",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77",
              "lang": "en",
              "type": "CWE"
            },
            {
              "cweId": "CWE-78",
              "description": "CWE-78",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-22T15:32:01.006Z",
        "orgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "shortName": "qnap"
      },
      "references": [
        {
          "url": "https://www.qnap.com/en/security-advisory/qsa-24-44"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "We have already fixed the vulnerability in the following versions:\u003cbr\u003eQuRouter 2.4.4.106 and later\u003cbr\u003e"
            }
          ],
          "value": "We have already fixed the vulnerability in the following versions:\nQuRouter 2.4.4.106 and later"
        }
      ],
      "source": {
        "advisory": "QSA-24-44",
        "discovery": "EXTERNAL"
      },
      "title": "QHora",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
    "assignerShortName": "qnap",
    "cveId": "CVE-2024-48861",
    "datePublished": "2024-11-22T15:32:01.006Z",
    "dateReserved": "2024-10-09T00:22:57.834Z",
    "dateUpdated": "2024-11-26T15:57:56.198Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CERTFR-2025-AVI-0486

Vulnerability from certfr_avis - Published: 2025-06-10 - Updated: 2025-06-10

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Qnap QTS QTS versions 5.2.x antérieures à 5.2.4.3079 build 20250321
Qnap QuRouter QuRouter versions 2.4.x et 2.5.x antérieures à 2.5.0.140
Qnap QuTS hero QuTS hero versions h5.2.x antérieures à h5.2.4.3079 build 20250321
Qnap License Center License Center versions 1.9.x antérieures à 1.9.49
Qnap File Station File Station 5 versions 5.5.x antérieures à 5.5.6.4847
Qnap Qsync Qsync Central versions 4.5.x antérieures à 4.5.0.6
Qnap QES QES versions 2.2.x antérieures à 2.2.1 build 20250304
References
Bulletin de sécurité Qnap QSA-25-17 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-11 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-14 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-10 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-09 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-15 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-13 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-16 2025-06-07 vendor-advisory
Bulletin de sécurité Qnap QSA-25-12 2025-06-07 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QTS versions 5.2.x ant\u00e9rieures \u00e0 5.2.4.3079 build 20250321",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuRouter versions 2.4.x et 2.5.x ant\u00e9rieures \u00e0 2.5.0.140",
      "product": {
        "name": "QuRouter",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.2.x ant\u00e9rieures \u00e0 h5.2.4.3079 build 20250321",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "License Center versions 1.9.x ant\u00e9rieures \u00e0 1.9.49",
      "product": {
        "name": "License Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "File Station 5 versions 5.5.x ant\u00e9rieures \u00e0 5.5.6.4847",
      "product": {
        "name": "File Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qsync Central versions 4.5.x ant\u00e9rieures \u00e0 4.5.0.6",
      "product": {
        "name": "Qsync",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QES versions 2.2.x ant\u00e9rieures \u00e0 2.2.1 build 20250304",
      "product": {
        "name": "QES",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-26465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
    },
    {
      "name": "CVE-2025-33031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33031"
    },
    {
      "name": "CVE-2024-56805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56805"
    },
    {
      "name": "CVE-2024-50406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50406"
    },
    {
      "name": "CVE-2025-22482",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22482"
    },
    {
      "name": "CVE-2025-26466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26466"
    },
    {
      "name": "CVE-2025-29872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29872"
    },
    {
      "name": "CVE-2025-29892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29892"
    },
    {
      "name": "CVE-2025-22490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22490"
    },
    {
      "name": "CVE-2025-29873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29873"
    },
    {
      "name": "CVE-2025-29884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29884"
    },
    {
      "name": "CVE-2025-33035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-33035"
    },
    {
      "name": "CVE-2025-29876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29876"
    },
    {
      "name": "CVE-2025-22485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22485"
    },
    {
      "name": "CVE-2024-13087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13087"
    },
    {
      "name": "CVE-2025-22484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22484"
    },
    {
      "name": "CVE-2023-28370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28370"
    },
    {
      "name": "CVE-2025-29877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29877"
    },
    {
      "name": "CVE-2025-29883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29883"
    },
    {
      "name": "CVE-2025-30279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30279"
    },
    {
      "name": "CVE-2025-22486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22486"
    },
    {
      "name": "CVE-2025-29871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29871"
    },
    {
      "name": "CVE-2024-6387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
    },
    {
      "name": "CVE-2025-22481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22481"
    },
    {
      "name": "CVE-2024-13088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13088"
    },
    {
      "name": "CVE-2025-29885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29885"
    }
  ],
  "initial_release_date": "2025-06-10T00:00:00",
  "last_revision_date": "2025-06-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0486",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Injection SQL (SQLi)"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-17",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-17"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-11",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-11"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-14",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-14"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-10",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-10"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-09",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-09"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-15",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-15"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-13",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-13"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-16",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-16"
    },
    {
      "published_at": "2025-06-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-12",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-12"
    }
  ]
}

CERTFR-2025-AVI-0188

Vulnerability from certfr_avis - Published: 2025-03-10 - Updated: 2025-03-10

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Qnap HBS 3 Hybrid Backup Sync HBS 3 Hybrid Backup Sync versions 25.1.x antérieures à 25.1.4.952
Qnap QuTS hero QuTS hero versions h5.1.x antérieures à h5.1.9.2954 build 20241120
Qnap QuLog Center QuLog Center versions 1.8.x antérieures à 1.8.0.888
Qnap File Station File Station versions 5.5.x antérieures à 5.5.6.4741
Qnap QTS QTS versions 5.1.x antérieures à 5.1.9.2954 build 20241120
Qnap Helpdesk Helpdesk versions 3.3.x antérieurs à 3.3.3
Qnap QuRouter QuRouter versions 2.4.x antérieures à 2.4.6.028
Qnap QVPN QVPN Device Client versions 2.2.x antérieures à 2.2.5 pour Mac
Qnap QTS QTS versions 5.2.x antérieures à 5.2.3.3006 build 20250108
Qnap QTS QTS versions 4.5.x antérieures à 4.5.4.2957 build 20241119
Qnap QuTS hero QuTS hero versions h4.5.x antérieures à h4.5.4.2956 build 20241119
Qnap QuLog Center QuLog Center versions 1.7.x antérieures à 1.7.0.829
Qnap Qsync Qsync Client versions 5.1.x antérieures à 5.1.3 pour Mac
Qnap QuTS hero QuTS hero versions h5.2.x antérieures à h5.2.3.3006 build 20250108
Qnap Qfinder Qfinder Pro Mac versions 7.11.x antérieures à 7.11.1
References
Bulletin de sécurité Qnap QSA-25-03 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-24-55 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-24-52 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-25-06 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-24-53 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-25-07 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-25-05 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-25-01 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-24-54 2025-03-08 vendor-advisory
Bulletin de sécurité Qnap QSA-24-51 2025-03-08 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "HBS 3 Hybrid Backup Sync versions 25.1.x ant\u00e9rieures \u00e0 25.1.4.952",
      "product": {
        "name": "HBS 3 Hybrid Backup Sync",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.9.2954 build 20241120",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuLog Center versions 1.8.x ant\u00e9rieures \u00e0 1.8.0.888",
      "product": {
        "name": "QuLog Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "File Station versions 5.5.x ant\u00e9rieures \u00e0 5.5.6.4741",
      "product": {
        "name": "File Station",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.9.2954 build 20241120",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Helpdesk versions 3.3.x ant\u00e9rieurs \u00e0 3.3.3",
      "product": {
        "name": "Helpdesk",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuRouter versions 2.4.x ant\u00e9rieures \u00e0 2.4.6.028",
      "product": {
        "name": "QuRouter",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QVPN Device Client versions 2.2.x ant\u00e9rieures \u00e0 2.2.5 pour Mac",
      "product": {
        "name": "QVPN",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.2.x ant\u00e9rieures \u00e0 5.2.3.3006 build 20250108",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 4.5.x ant\u00e9rieures \u00e0 4.5.4.2957 build 20241119",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h4.5.x ant\u00e9rieures \u00e0 h4.5.4.2956 build 20241119",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuLog Center versions 1.7.x ant\u00e9rieures \u00e0 1.7.0.829",
      "product": {
        "name": "QuLog Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qsync Client versions 5.1.x ant\u00e9rieures \u00e0 5.1.3 pour Mac",
      "product": {
        "name": "Qsync",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.2.x ant\u00e9rieures \u00e0 h5.2.3.3006 build 20250108",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Qfinder Pro Mac versions 7.11.x ant\u00e9rieures \u00e0 7.11.1",
      "product": {
        "name": "Qfinder",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-53695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53695"
    },
    {
      "name": "CVE-2024-50390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50390"
    },
    {
      "name": "CVE-2024-53700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53700"
    },
    {
      "name": "CVE-2024-53696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53696"
    },
    {
      "name": "CVE-2024-53698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53698"
    },
    {
      "name": "CVE-2024-53693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53693"
    },
    {
      "name": "CVE-2024-53694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53694"
    },
    {
      "name": "CVE-2024-53697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53697"
    },
    {
      "name": "CVE-2024-48864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48864"
    },
    {
      "name": "CVE-2024-50394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50394"
    },
    {
      "name": "CVE-2024-13086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13086"
    },
    {
      "name": "CVE-2024-53699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53699"
    },
    {
      "name": "CVE-2024-53692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53692"
    },
    {
      "name": "CVE-2024-50405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50405"
    },
    {
      "name": "CVE-2024-38638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38638"
    }
  ],
  "initial_release_date": "2025-03-10T00:00:00",
  "last_revision_date": "2025-03-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0188",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-03",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-03"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-55",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-55"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-52",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-52"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-06",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-06"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-53",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-53"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-07",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-07"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-05",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-05"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-25-01",
      "url": "https://www.qnap.com/go/security-advisory/qsa-25-01"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-54",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-54"
    },
    {
      "published_at": "2025-03-08",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-51",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-51"
    }
  ]
}

CERTFR-2024-AVI-1018

Vulnerability from certfr_avis - Published: 2024-11-25 - Updated: 2024-11-25

De multiples vulnérabilités ont été découvertes dans les produits Qnap. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Qnap N/A Photo Station versions 6.4.x antérieures à 6.4.3
Qnap QuRouter QuRouter versions 2.4.x antérieures à 2.4.4.106
Qnap QuLog Center QuLog Center versions 1.8.x antérieures à 1.8.0.888
Qnap QuRouter QuRouter versions 2.4.x antérieures à 2.4.3.103
Qnap QuTS hero QuTS hero versions h5.2.x antérieures à h5.2.1.2929 build 20241025
Qnap N/A Notes Station 3 versions 3.9.x antérieures à 3.9.7
Qnap QuTS hero QuTS hero versions h5.1.x antérieures à h5.1.8.2823 build 20240712
Qnap QTS QTS versions 5.1.x antérieures à 5.1.8.2823 build 20240712
Qnap N/A Media Streaming add-on versions 500.1.x antérieures à 500.1.1.6
Qnap QTS QTS versions 5.2.x antérieures à 5.2.1.2930 build 20241025
Qnap N/A QNAP AI Core versions 3.4.x antérieures à 3.4.1
Qnap QuLog Center QuLog Center versions 1.7.x antérieures à 1.7.0.831
References
Bulletin de sécurité Qnap QSA-24-44 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-36 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-37 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-39 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-47 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-40 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-46 2024-11-23 vendor-advisory
Bulletin de sécurité Qnap QSA-24-43 2024-11-23 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Photo Station versions 6.4.x ant\u00e9rieures \u00e0 6.4.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuRouter versions 2.4.x ant\u00e9rieures \u00e0 2.4.4.106",
      "product": {
        "name": "QuRouter",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuLog Center versions 1.8.x ant\u00e9rieures \u00e0 1.8.0.888",
      "product": {
        "name": "QuLog Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuRouter versions 2.4.x ant\u00e9rieures \u00e0 2.4.3.103",
      "product": {
        "name": "QuRouter",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.2.x ant\u00e9rieures \u00e0 h5.2.1.2929 build 20241025",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Notes Station 3 versions 3.9.x ant\u00e9rieures \u00e0 3.9.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuTS hero versions h5.1.x ant\u00e9rieures \u00e0 h5.1.8.2823 build 20240712",
      "product": {
        "name": "QuTS hero",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.1.x ant\u00e9rieures \u00e0 5.1.8.2823 build 20240712",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "Media Streaming add-on versions 500.1.x ant\u00e9rieures \u00e0 500.1.1.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QTS versions 5.2.x ant\u00e9rieures \u00e0 5.2.1.2930 build 20241025",
      "product": {
        "name": "QTS",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QNAP AI Core versions 3.4.x ant\u00e9rieures \u00e0 3.4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    },
    {
      "description": "QuLog Center versions 1.7.x ant\u00e9rieures \u00e0 1.7.0.831 ",
      "product": {
        "name": "QuLog Center",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-50397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50397"
    },
    {
      "name": "CVE-2024-37050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37050"
    },
    {
      "name": "CVE-2024-38643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38643"
    },
    {
      "name": "CVE-2024-50398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50398"
    },
    {
      "name": "CVE-2024-37042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37042"
    },
    {
      "name": "CVE-2024-32768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32768"
    },
    {
      "name": "CVE-2024-48860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48860"
    },
    {
      "name": "CVE-2024-50399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50399"
    },
    {
      "name": "CVE-2024-48861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48861"
    },
    {
      "name": "CVE-2024-48862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48862"
    },
    {
      "name": "CVE-2024-32770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32770"
    },
    {
      "name": "CVE-2024-37049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37049"
    },
    {
      "name": "CVE-2024-38644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38644"
    },
    {
      "name": "CVE-2024-37041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37041"
    },
    {
      "name": "CVE-2024-37048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37048"
    },
    {
      "name": "CVE-2024-50396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50396"
    },
    {
      "name": "CVE-2024-32767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32767"
    },
    {
      "name": "CVE-2024-37045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37045"
    },
    {
      "name": "CVE-2024-38647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38647"
    },
    {
      "name": "CVE-2024-37046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37046"
    },
    {
      "name": "CVE-2024-37047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37047"
    },
    {
      "name": "CVE-2023-38408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
    },
    {
      "name": "CVE-2024-32769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32769"
    },
    {
      "name": "CVE-2024-50400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50400"
    },
    {
      "name": "CVE-2020-14145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14145"
    },
    {
      "name": "CVE-2024-38645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38645"
    },
    {
      "name": "CVE-2024-50395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50395"
    },
    {
      "name": "CVE-2024-37043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37043"
    },
    {
      "name": "CVE-2021-41617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-41617"
    },
    {
      "name": "CVE-2024-38646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38646"
    },
    {
      "name": "CVE-2024-37044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37044"
    },
    {
      "name": "CVE-2024-50401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50401"
    }
  ],
  "initial_release_date": "2024-11-25T00:00:00",
  "last_revision_date": "2024-11-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1018",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Qnap. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Qnap",
  "vendor_advisories": [
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-44",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-44"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-36",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-36"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-37",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-37"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-39",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-39"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-47",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-47"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-40",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-40"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-46",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-46"
    },
    {
      "published_at": "2024-11-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-43",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-43"
    }
  ]
}

CERTFR-2024-AVI-0943

Vulnerability from certfr_avis - Published: 2024-11-05 - Updated: 2024-11-05

Une vulnérabilité a été découverte dans Qnap QuRouter. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Qnap QuRouter QuRouter versions 2.4.x antérieures à 2.4.5.032
References
Bulletin de sécurité Qnap QSA-24-45 2024-11-04 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "QuRouter versions 2.4.x ant\u00e9rieures \u00e0 2.4.5.032",
      "product": {
        "name": "QuRouter",
        "vendor": {
          "name": "Qnap",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-50389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50389"
    }
  ],
  "initial_release_date": "2024-11-05T00:00:00",
  "last_revision_date": "2024-11-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0943",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Qnap QuRouter. Elle permet \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Qnap QuRouter",
  "vendor_advisories": [
    {
      "published_at": "2024-11-04",
      "title": "Bulletin de s\u00e9curit\u00e9 Qnap QSA-24-45",
      "url": "https://www.qnap.com/go/security-advisory/qsa-24-45"
    }
  ]
}