Description
A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.7.3256 build 20250913 and later QuTS hero h5.2.7.3256 build 20250913 and later QuTS hero h5.3.1.3250 build 20250912 and later
Scores
CVSS v3
6.5
EPSS
0.0006
EPSS Percentile
17.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-134
Status
published
Products (34)
qnap/qts
5.2.0.2737 build_20240417
qnap/qts
5.2.0.2744 build_20240424
qnap/qts
5.2.0.2782 build_20240601
qnap/qts
5.2.0.2802 build_20240620
qnap/qts
5.2.0.2823 build_20240711
qnap/qts
5.2.0.2851 build_20240808
qnap/qts
5.2.0.2860 build_20240817
qnap/qts
5.2.1.2930 build_20241025
qnap/qts
5.2.2.2950 build_20241114
qnap/qts
5.2.3.3006 build_20250108
... and 24 more
Published
Jan 02, 2026
Tracked Since
Feb 18, 2026