[CIVN-2026-0169] Multiple Vulnerabilities in QNAP Products

By Published On: April 2, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in QNAP Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Software Affected


QVR Pro versions prior to 2.7.4.1485

QuNetSwitch versions prior to 2.0.4.0415 and 2.0.5.0906

QuRouter versions prior to 2.6.3.009

QuFTP Service versions prior to 1.4.3

QuFTP Service versions prior to 1.5.2

QuFTP Service versions prior to 1.6.2

Overview


Multiple vulnerabilities have been reported in QNAP products which may allow a remote attacker to gain elevated privileges, bypass security restrictions, execute arbitrary code, disclose sensitive information, and cause denial-of-service (DoS) conditions on the targeted system.


Target Audience:

Individuals and organizations using the above mentioned QNAP products.


Risk Assessment:

High risk of full system compromise, unauthorized access, system instability.


Impact Assessment:

Memory corruption, sensitive information disclosure, and service disruption.


Description


QNAP offers a wide range of network-attached storage (NAS), direct-attached storage (DAS), networking devices, surveillance solutions and cloud applications. These products are widely used for data backup, file sharing, multimedia streaming, virtualization and security.


The vulnerabilities exist in QNAP products due to missing authentication, command injection, improper restriction of communication channels, inadequate neutralization of escape or control sequences, and cross-site scripting (XSS).


Successful exploitation of these vulnerabilities may allow a remote attacker to gain elevated privileges, bypass security restrictions, execute arbitrary code, disclose sensitive information and cause denial-of-service (DoS) conditions on the targeted system.


Solution


Apply appropriate patches as mentioned in QNAPs advisory:

https://www.qnap.com/en/security-advisory/qsa-26-07


https://www.qnap.com/en/security-advisory/qsa-26-11


https://www.qnap.com/en/security-advisory/qsa-26-12


https://www.qnap.com/en/security-advisory/qsa-26-15



Vendor Information


QNAP

https://www.qnap.com/en/security-advisories


References


 

https://www.qnap.com/en/security-advisory/qsa-26-07

https://www.qnap.com/en/security-advisory/qsa-26-11

https://www.qnap.com/en/security-advisory/qsa-26-12

https://www.qnap.com/en/security-advisory/qsa-26-15


CVE Name

CVE-2026-22898

CVE-2026-22897

CVE-2026-22900

CVE-2026-22901

CVE-2026-22902

CVE-2025-62843

CVE-2025-62844

CVE-2025-62846

CVE-2025-62845

CVE-2026-22895




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnOh8oACgkQ3jCgcSdc

ys+Nkw/+Ii/5dHszkSkqu2NHpPH8SbQubY57l9dUn4BkoY9yVt5GkTlRqwBGPpnO

oGNeicJoj5oghKEgMqZE9QHf9dAMNYK0NivNw3b1++DBOKiofxp8udtOwMSUVX2r

oXdRJgly63yv8m2z/ScmCRRbeC+tEcfyMxDlyoKDqjgP/b4gym7RVIbwHoervb0E

MDRjSHUE/BBhGpHsGW40D9rlEXt9Nhz+ZFZP/HccBtjZBeLlYyVsz50jAFw1aWKm

T4g7IghMbyIYKTik+tsgTPwwTRCcsQPZI6mUFp0xB/z7AmDWdYDudI9Xc8n45aQ4

akcRSq3e56/GrQ1TKvYM1Mp0Z/lYWLcaqLJIEE3Ir/GzwMwkA3y2rfjNMWsmWbMn

1KzgetRcXRMxs3GE+d3d3gvIDG7l68BTR8decheWHcG+3Nf0GGmd1TiLhoROFDya

EeZYP9ARTOwrJU7bXQimsqfTdwm3zNZmOZhJ2u5PFhQJLfheqzkrIxS7t065y3Zg

qs7GcDar2e40JJDsNCL4H4JCytzkkOvTSseAHQAO5SEX/8KC3kDMlF2L+qirNlMW

SSTqbmqTaPxqYlB6+B0BxFC4uqIpvxGKL5fHUYg48bdnJ5Ja5YQ6M4lrmXoJEAIp

6hxpCQk0z1fLf1yvqzcuKTe4nD1U9+1Z2momO2F+5+op8FxitSs=

=THpm

—–END PGP SIGNATURE—–

Share this article