Description
A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.8.2823 build 20240712 and later QuTS hero h5.1.8.2823 build 20240712 and later
References (1)
Core 1
Core References
Vendor Advisory
https://www.qnap.com/en/security-advisory/qsa-24-33
Scores
CVSS v3
8.8
EPSS
0.0069
EPSS Percentile
71.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-122
CWE-120
Status
published
Products (27)
qnap/qts
5.1.0.2348 build_20230325
qnap/qts
5.1.0.2399 build_20230515
qnap/qts
5.1.0.2418 build_20230603
qnap/qts
5.1.0.2444 build_20230629
qnap/qts
5.1.0.2466 build_20230721
qnap/qts
5.1.1.2491 build_20230815
qnap/qts
5.1.2.2533 build_20230926
qnap/qts
5.1.3.2578 build_20231110
qnap/qts
5.1.4.2596 build_20231128
qnap/qts
5.1.5.2645 build_20240116
... and 17 more
Published
Sep 06, 2024
Tracked Since
Feb 18, 2026