SB2026010582 - Multiple vulnerabilities in QNAP QTS and QuTS hero 



SB2026010582 - Multiple vulnerabilities in QNAP QTS and QuTS hero

Published: January 5, 2026

Security Bulletin ID SB2026010582
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 20% Low 80%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Exposure of Sensitive System Information to an Unauthorized Control Sphere (CVE-ID: CVE-2025-9110)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to exposure of sensitive system information to an unauthorized control sphere. A remote attacker can read application data on the system.


2) Buffer overflow (CVE-ID: CVE-2025-48721)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error. A remote administrator can trigger memory corruption and cause a denial of service condition on the target system.


3) Buffer overflow (CVE-ID: CVE-2025-62852)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error. A remote administrator can trigger memory corruption and modify memory or crash processes on the target system.


4) Path traversal (CVE-ID: CVE-2025-59380)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote administrator can send a specially crafted HTTP request and read arbitrary files on the system.


5) Path traversal (CVE-ID: CVE-2025-59381)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences. A remote administrator can send a specially crafted HTTP request and read arbitrary files on the system.


Remediation

Install update from vendor's website.