Critical (9.8)

Qnap Vulnerability (CVE-2025-66277)

CVE-2025-66277

A link following vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to traverse the file system to unintended loc...

Affected: Qnap Qts Qnap Qts Qnap Qts Qnap Qts Qnap Qts

Overview

A critical security vulnerability has been identified in multiple QNAP operating systems. This flaw, classified as a link following or path traversal vulnerability, could allow a remote attacker to access files and directories outside of the intended, restricted location on the file system.

Vulnerability Explained

In simple terms, this vulnerability is a failure in how the system validates file paths. Normally, applications restrict access to specific folders. However, by using specially crafted requests containing sequences like ../ (which means “go up one directory”), a remote attacker can “trick” the system into following a link or path to unauthorized locations. This allows them to read, and potentially modify, sensitive system files they should not have access to.

Potential Impact

The impact of this vulnerability is severe (CVSS Score: 9.8/10, CRITICAL). A successful exploit could enable an unauthenticated remote attacker to:

  • Access sensitive data from anywhere on the system.
  • Read configuration files that may contain passwords or other secrets.
  • Potentially modify or delete critical system files, leading to system instability or a full compromise.
  • Use the accessed information as a foothold for further attacks within the network.

Remediation and Mitigation

The only complete remediation is immediate patching. QNAP has released fixed versions for the affected operating systems.

Action Required: Update Immediately

If you are running any of the affected QNAP OS versions, you must upgrade to one of the following patched releases without delay:

  • QTS: Upgrade to version 5.2.8.3350 (build 20251216) or later.
  • QuTS hero h5.3.2: Upgrade to version 3354 (build 20251225) or later.
  • QuTS hero h5.2.8: Upgrade to version 3350 (build 20251216) or later.

How to Update:

  1. Log into your QNAP device’s web administration interface (QTS/QuTS).
  2. Navigate to Control Panel > System > Firmware Update.
  3. Click “Check for Update” or follow the prompts to install the latest version listed above.
  4. Reboot the device if required after the update completes.

Additional Security Advice:

  • Verify Your Version: Confirm your current OS version in Control Panel > System > Firmware Update.
  • Network Segmentation: Ensure your QNAP devices are not directly exposed to the public internet. Place them on a segmented network with strict firewall rules.
  • Backup: Maintain recent, offline backups of your critical data. While this does not mitigate the vulnerability, it is essential for recovery in case of a breach.

Do not delay applying these updates. Given the critical nature and ease of exploitation, affected systems are at high risk until patched.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.