This vulnerability allows remote attackers to execute arbitrary code on affected installations of QNAP NAS. Authentication is not required to exploit this vulnerability. The specific flaw exists within the RTSS server, which listens on TCP port 8899 by default. The issue results from the lack of authentication prior to allowing alterations to the system configuration. An attacker can leverage this vulnerability to execute arbitrary code in the context of the Administrator.
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP NAS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-21-783 is high due to the potential for remote code execution without authentication.
To fix ZDI-21-783, it is recommended to update the QNAP NAS firmware to the latest version provided by the vendor.
ZDI-21-783 affects QNAP NAS devices with the RTSS server running on TCP port 8899.
Yes, ZDI-21-783 can be exploited remotely without the need for authentication.
Not addressing ZDI-21-783 may allow attackers to execute arbitrary code on the affected QNAP NAS devices.