Description:
QNAP has published security advisories to address multiple vulnerabilities in QNAP products. The list of patches can be found at:
https://www.qnap.com/go/security-advisory/qsa-25-30
https://www.qnap.com/go/security-advisory/qsa-25-32
https://www.qnap.com/go/security-advisory/qsa-25-34
https://www.qnap.com/go/security-advisory/qsa-25-35
https://www.qnap.com/go/security-advisory/qsa-25-36
https://www.qnap.com/go/security-advisory/qsa-25-39
Affected Systems:
- QNAP NAS devices running NetBak Replicator versions prior to 4.5.15.0807
- QNAP NAS devices running QNAP Authenticator versions prior to 1.3.1.1227
- QNAP NAS devices running Qsync Central versions prior to 5.0.0.2 (2025/07/31)
- QNAP NAS devices running QTS operating system versions prior to 5.2.6.3195 build 20250715
- QNAP NAS devices running QuTS hero operating system versions prior to h5.2.6.3195 build 20250715
- QNAP NAS devices running Video Station versions prior to 5.8.4
For detailed information of the affected systems, please refer to the corresponding security advisory at vendor's website.
Impact:
Successful exploitation of the vulnerabilities could lead to remote code execution, denial of service, information disclosure or security restriction bypass on an affected system.
Recommendation:
Patches for affected systems are available. System administrators of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
More Information:
- https://www.qnap.com/go/security-advisory/qsa-25-30
- https://www.qnap.com/go/security-advisory/qsa-25-32
- https://www.qnap.com/go/security-advisory/qsa-25-34
- https://www.qnap.com/go/security-advisory/qsa-25-35
- https://www.qnap.com/go/security-advisory/qsa-25-36
- https://www.qnap.com/go/security-advisory/qsa-25-39
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56804
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-33034
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-33039 (to CVE-2025-33040)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-44006 (to CVE-2025-44012)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-44014
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47210 (to CVE-2025-47214)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48726 (to CVE-2025-48730)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52424
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52427 (to CVE-2025-52429)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52432 (to CVE-2025-52433)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52853 (to CVE-2025-52855)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52857 (to CVE-2025-52860)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52862
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52866 (to CVE-2025-52867)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53406 (to CVE-2025-53407)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53595
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54153 (to CVE-2025-54154)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57714