First published: Fri Mar 07 2025(Updated: )
A command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to execute arbitrary commands. We have already fixed the vulnerability in the following versions: QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.2.3.3006 build 20250108 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <5.2.3.3006 | |
QNAP QuTS hero | <5.2.3.3006 |
We have already fixed the vulnerability in the following versions: QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.2.3.3006 build 20250108 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53692 has been classified as a high-severity command injection vulnerability.
To fix CVE-2024-53692, upgrade your QNAP QTS or QuTS hero operating system to version 5.2.3.3007 or later.
CVE-2024-53692 affects QNAP QTS and QuTS hero versions up to and including 5.2.3.3006.
Exploitation of CVE-2024-53692 allows remote attackers with administrative access to execute arbitrary commands.
There are no specific workarounds for CVE-2024-53692; the only solution is to update to the patched version.