A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory.
We have already fixed the vulnerability in the following versions:
QTS 5.2.6.3195 build 20250715 and later
QuTS hero h5.2.6.3195 build 20250715 and later
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-25-36 |
![]() ![]() |
History
Fri, 03 Oct 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 03 Oct 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use of externally-controlled format string vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later | |
Title | QTS, QuTS hero | |
Weaknesses | CWE-134 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2025-10-03T19:10:06.668Z
Reserved: 2025-06-30T07:19:56.928Z
Link: CVE-2025-53406

Updated: 2025-10-03T19:03:42.669Z

Status : Received
Published: 2025-10-03T19:15:48.543
Modified: 2025-10-03T19:15:48.543
Link: CVE-2025-53406

No data.

No data.