CVE-2024-14026
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with a user account and access to the local network to run any commands on the affected QNAP devices. To exploit it, they need to already be on the same network and have valid login credentials.
Technical Description
A command injection vulnerability has been reported to affect several QNAP operating system versions. If an attacker gains local network access who have also gained a user account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.1.9.2954 build 20241120 and later QuTS hero h5.2.3.3006 build 20250108 and later
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 11, 2026
27 days ago
Last Modified
Mar 12, 2026
26 days ago
Vendor
qnap
Product
qts
Related Vulnerabilities
An attacker with administrator access on the local network can exploit a flaw in Video Station to run unauthorized commands or code. This vulnerability has been fixed in version 5.8.2 and later, so updating is essential to protect against this risk.
An attacker with access to the local network and an administrator account can exploit a flaw in Video Station to bypass security measures and potentially compromise the system. This vulnerability has been fixed in version 5.8.2 and later, so it's important to update to that version or newer.
This vulnerability allows an attacker with valid login credentials to run malicious commands on affected QNAP NVR devices over the network. It specifically impacts older models using QVR Firmware 4.x, but has been fixed in version 5.0.0 and later.