This vulnerability allows network-adjacent attackers to create arbitrary files on affected installations of QNAP NAS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the MusicStation application. When parsing the arttype request parameter, the process does not properly validate a user-supplied path prior to using it in file operations.An attacker can leverage this vulnerability to create files in the context of the admin user.
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP NAS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-21-591 is considered critical as it allows unauthenticated attackers to create arbitrary files on QNAP NAS devices.
To fix ZDI-21-591, update the MusicStation application on your QNAP NAS to the latest version provided by QNAP.
ZDI-21-591 affects QNAP NAS devices that have the MusicStation application installed.
Yes, ZDI-21-591 can be exploited remotely as it allows network-adjacent attackers to access the vulnerability.
No, authentication is not required to exploit ZDI-21-591, making it more dangerous.