Qnap: Update closes some high-risk gaps in QTS and QuTS hero

Updates for the QTS and QuTS-hero firmwares of Qnap devices close security vulnerabilities classified as high-risk.

listen Print view
Finger taps the update button

(Image: heise online / dmk)

2 min. read

Updated versions of the QTS and QuTS-hero firmware of Qnap devices plug security leaks, some of which have been classified as high risk. Attackers can misuse them to execute arbitrary commands or for denial-of-service attacks.

Qnap reported a total of eleven vulnerabilities over the weekend, which the firmware updates patch. The most serious is a command injection vulnerability. If attackers gain remote access to an account, they can execute arbitrary commands (CVE-2025-30264, CVSS 7.7, risk"high"). Malicious actors from the network can also exploit another vulnerability after logging in to write outside designated memory areas and thus modify or disrupt memory (CVE-2025-30273, CVSS 7.1, risk"high").

The updates also patch other vulnerabilities, but these are only considered medium or low risk. A NULL pointer dereference can trigger a denial of service (DoS) (CVE-2025-29882). A buffer overflow can lead to modification of memory areas (CVE-2025-30265); further NULL pointer dereferences can lead to DoS (CVE-2025-30267, CVE-2025-30268, CVE-2025-30272, CVE-2025-30274) or a path traversal vulnerability allowing read access to unexpected files or system data (CVE-2025-30270, CVE-2025-30271, CVE-2025-33032).

QTS 5.2.x and QuTS hero h5.2.x are affected. The good news is that firmware updates have already been available for months that close the security vulnerabilities now reported: QTS 5.2.5.3145 build 20250526 and QuTS hero h5.2.5.3138 build 20250519 and newer versions in each case correct the security-relevant errors.

Videos by heise

Admins should check their Qnap device to see if the update has already been installed. After logging into the user interface as an administrator, this can be done via "Control Panel" – "System" – "Firmware Update". Under "Live Update", click on "Check for Update" to download and install the latest firmware version.

In the middle of last week, Qnap had already closed high-risk security gaps in File Station 5 with software updates.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.