
[CIVN-2026-0169] Multiple Vulnerabilities in QNAP Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in QNAP Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
QVR Pro versions prior to 2.7.4.1485
QuNetSwitch versions prior to 2.0.4.0415 and 2.0.5.0906
QuRouter versions prior to 2.6.3.009
QuFTP Service versions prior to 1.4.3
QuFTP Service versions prior to 1.5.2
QuFTP Service versions prior to 1.6.2
Overview
Multiple vulnerabilities have been reported in QNAP products which may allow a remote attacker to gain elevated privileges, bypass security restrictions, execute arbitrary code, disclose sensitive information, and cause denial-of-service (DoS) conditions on the targeted system.
Target Audience:
Individuals and organizations using the above mentioned QNAP products.
Risk Assessment:
High risk of full system compromise, unauthorized access, system instability.
Impact Assessment:
Memory corruption, sensitive information disclosure, and service disruption.
Description
QNAP offers a wide range of network-attached storage (NAS), direct-attached storage (DAS), networking devices, surveillance solutions and cloud applications. These products are widely used for data backup, file sharing, multimedia streaming, virtualization and security.
The vulnerabilities exist in QNAP products due to missing authentication, command injection, improper restriction of communication channels, inadequate neutralization of escape or control sequences, and cross-site scripting (XSS).
Successful exploitation of these vulnerabilities may allow a remote attacker to gain elevated privileges, bypass security restrictions, execute arbitrary code, disclose sensitive information and cause denial-of-service (DoS) conditions on the targeted system.
Solution
Apply appropriate patches as mentioned in QNAPs advisory:
https://www.qnap.com/en/security-advisory/qsa-26-07
https://www.qnap.com/en/security-advisory/qsa-26-11
https://www.qnap.com/en/security-advisory/qsa-26-12
https://www.qnap.com/en/security-advisory/qsa-26-15
Vendor Information
QNAP
https://www.qnap.com/en/security-advisories
References
https://www.qnap.com/en/security-advisory/qsa-26-07
https://www.qnap.com/en/security-advisory/qsa-26-11
https://www.qnap.com/en/security-advisory/qsa-26-12
https://www.qnap.com/en/security-advisory/qsa-26-15
CVE Name
CVE-2026-22898
CVE-2026-22897
CVE-2026-22900
CVE-2026-22901
CVE-2026-22902
CVE-2025-62843
CVE-2025-62844
CVE-2025-62846
CVE-2025-62845
CVE-2026-22895
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=THpm
—–END PGP SIGNATURE—–


