Security News > 2021 > April > Unpatched RCE Flaws Affect Tens of Thousands of QNAP SOHO NAS Devices
A pair of unpatched vulnerabilities in QNAP small office/home office network attached storage devices could allow attackers to execute code remotely, according to a warning from security researchers at SAM Seamless Network.
The bugs were found to affect QNAP TS-231 SOHO NAS devices running firmware version 4.3.6.1446, but potentially impact other QNAP devices as well, provided they use the same firmware release.
No patch has been released for the vulnerable devices although one of the flaws was initially reported during the first half of October 2020, SAM reveals.
"These vulnerabilities are severe in nature as they allow for full takeover of devices from the network including access to the user's stored data, without any prior knowledge," according to an advisory from SAM. The first bug resides in the NAS web server, which by default uses TCP port 8080 and exists because of the lack of proper input sanitization for some APIs.
With previous remote code execution flaws in QNAP NAS devices abusing web pages that do not require authentication, but execute code server-side, SAM's researchers started looking at cgi files that implement such pages.
According to them, the flaws potentially impact tens of thousands of QNAP devices that are exposed to the Internet.
News URL
Related news
- QNAP fixes NAS backup software zero-day exploited at Pwn2Own (source)
- Synology Urges Patch for Critical Zero-Click RCE Flaw Affecting Millions of NAS Devices (source)
- QNAP pulls buggy QTS firmware causing widespread NAS issues (source)
- QNAP addresses critical flaws across NAS, router software (source)