First published: Fri Dec 08 2023(Updated: )
An OS command injection vulnerability has been found to affect legacy QNAP VioStor NVR models running QVR Firmware 4.x. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following versions: QVR Firmware 5.0.0 and later
Credit: security@qnapsecurity.com.tw security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP VioStor NVR | ||
QNAP QVR Firmware | >=4.0.0<5.0.0 |
We have already fixed the vulnerability in the following versions: QVR Firmware 5.0.0 and later
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47565 is classified as a high-severity OS command injection vulnerability affecting legacy QNAP VioStor NVR models.
CVE-2023-47565 affects authenticated users of legacy QNAP VioStor NVR models running QVR Firmware 4.x.
To fix CVE-2023-47565, upgrade your QNAP VioStor NVR to QVR Firmware version 5.0.0 or later.
CVE-2023-47565 is an OS command injection vulnerability that can be exploited to execute commands over the network.
If exploited, CVE-2023-47565 allows attackers to execute arbitrary commands on affected QNAP VioStor NVR devices.