Qnap Vulnerability (CVE-2025-66277)
CVE-2025-66277
A link following vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to traverse the file system to unintended loc...
Overview
A critical security vulnerability has been identified in multiple QNAP operating systems. This flaw, classified as a link following or path traversal vulnerability, could allow a remote attacker to access files and directories outside of the intended, restricted location on the file system.
Vulnerability Explained
In simple terms, this vulnerability is a failure in how the system validates file paths. Normally, applications restrict access to specific folders. However, by using specially crafted requests containing sequences like ../ (which means “go up one directory”), a remote attacker can “trick” the system into following a link or path to unauthorized locations. This allows them to read, and potentially modify, sensitive system files they should not have access to.
Potential Impact
The impact of this vulnerability is severe (CVSS Score: 9.8/10, CRITICAL). A successful exploit could enable an unauthenticated remote attacker to:
- Access sensitive data from anywhere on the system.
- Read configuration files that may contain passwords or other secrets.
- Potentially modify or delete critical system files, leading to system instability or a full compromise.
- Use the accessed information as a foothold for further attacks within the network.
Remediation and Mitigation
The only complete remediation is immediate patching. QNAP has released fixed versions for the affected operating systems.
Action Required: Update Immediately
If you are running any of the affected QNAP OS versions, you must upgrade to one of the following patched releases without delay:
- QTS: Upgrade to version 5.2.8.3350 (build 20251216) or later.
- QuTS hero h5.3.2: Upgrade to version 3354 (build 20251225) or later.
- QuTS hero h5.2.8: Upgrade to version 3350 (build 20251216) or later.
How to Update:
- Log into your QNAP device’s web administration interface (QTS/QuTS).
- Navigate to Control Panel > System > Firmware Update.
- Click “Check for Update” or follow the prompts to install the latest version listed above.
- Reboot the device if required after the update completes.
Additional Security Advice:
- Verify Your Version: Confirm your current OS version in Control Panel > System > Firmware Update.
- Network Segmentation: Ensure your QNAP devices are not directly exposed to the public internet. Place them on a segmented network with strict firewall rules.
- Backup: Maintain recent, offline backups of your critical data. While this does not mitigate the vulnerability, it is essential for recovery in case of a breach.
Do not delay applying these updates. Given the critical nature and ease of exploitation, affected systems are at high risk until patched.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 12 (JumpToUser) accepts an arbitrary entry point address from user-space registers witho...
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...
NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 15 (MemoryMapRange) allows Ring 3 user-mode processes to map arbitrary virtual address r...