[CIVN-2025-0302] Multiple Vulnerabilities in QNAP Products

By Published On: November 11, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in QNAP Products 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
QTS versions prior to 5.2.7.3297 build 20251024
QuTS hero versions prior to h5.2.7.3297 build 20251024
QuTS hero versions prior to h5.3.1.3292 build 20251024
Overview
Multiple vulnerabilities have been identified in QNAP QTS and QuTS hero that could be exploited by remote attacker to execute arbitrary code and gain elevated privileges on the targeted system.
Target Audience:
Organizations and individuals using affected QNAP devices and applications.
Impact Assessment:
Execution of arbitrary commands, Privilege escalation.
Risk Assessment:
High risk of remote code execution, Full system takeover.
Description
QNAP offers a wide range of network-attached storage (NAS), direct-attached storage (DAS), networking devices, surveillance solutions, and cloud applications. These products are widely used for data backup, file sharing, multimedia streaming, virtualization, and security.
These vulnerabilities exist in QNAP QTS and QuTS due to improper input validation and inadequate access control. An attacker could exploit these vulnerabilities by sending specially crafted requests on the targeted system.
Successful exploitation of these vulnerabilities may allow an attacker to execute arbitrary code and gain elevated privileges on the targeted system.
Solution
Apply appropriate patches as mentioned in QNAPs advisory:
https://www.qnap.com/en/security-advisory/qsa-25-45
Vendor Information
QNAP
https://www.qnap.com/en/security-advisories
References
QNAP
https://www.qnap.com/en/security-advisory/qsa-25-45
CVE Name
CVE-2025-62847
CVE-2025-62848
CVE-2025-62849
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=r6S4
—–END PGP SIGNATURE—–

Share this article