CVE-2023-47565
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with valid login credentials to run malicious commands on affected QNAP NVR devices over the network. It specifically impacts older models using QVR Firmware 4.x, but has been fixed in version 5.0.0 and later.
Technical Description
An OS command injection vulnerability has been found to affect legacy QNAP VioStor NVR models running QVR Firmware 4.x. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following versions: QVR Firmware 5.0.0 and later
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Dec 8, 2023
over 2 years ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
qnap
Product
qvr firmware
Related Vulnerabilities
This vulnerability allows an attacker with a user account and access to the local network to run any commands on the affected QNAP devices. To exploit it, they need to already be on the same network and have valid login credentials.
An attacker with administrator access on the local network can exploit a flaw in Video Station to run unauthorized commands or code. This vulnerability has been fixed in version 5.8.2 and later, so updating is essential to protect against this risk.
An attacker with access to the local network and an administrator account can exploit a flaw in Video Station to bypass security measures and potentially compromise the system. This vulnerability has been fixed in version 5.8.2 and later, so it's important to update to that version or newer.