CVE-2021-28804

9.8 CRITICAL

📋 TL;DR

This CVE-2021-28804 is a critical command injection vulnerability in QNAP QTS and QuTS hero operating systems that allows attackers to execute arbitrary commands on affected devices. Attackers can potentially gain full control of compromised systems. This affects QNAP NAS devices running vulnerable versions of QTS or QuTS hero.

💻 Affected Systems

Products:
  • QNAP QTS
  • QNAP QuTS hero
Versions: QTS versions prior to 4.5.1.1540 build 20210107; QuTS hero versions prior to h4.5.1.1582 build 20210217
Operating Systems: QTS, QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all QNAP NAS devices running vulnerable firmware versions. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with root privileges, install malware, exfiltrate data, or use the device as a pivot point into the network.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data theft, or cryptocurrency mining malware installation on vulnerable QNAP devices.

🟢

If Mitigated

Limited impact if devices are patched, behind firewalls, and have restricted network access, though the vulnerability remains critical if exposed.

🌐 Internet-Facing: HIGH - QNAP devices are often exposed to the internet for remote access, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Still significant risk from internal threats or compromised internal systems, but less exposure than internet-facing devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

This vulnerability has been actively exploited in the wild. Exploitation requires no authentication and is relatively simple to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QTS 4.5.1.1540 build 20210107 or later; QuTS hero h4.5.1.1582 build 20210217 or later

Vendor Advisory: https://www.qnap.com/zh-tw/security-advisory/qsa-21-29

Restart Required: Yes

Instructions:

1. Log into QNAP device web interface. 2. Go to Control Panel > System > Firmware Update. 3. Check for updates and install latest firmware. 4. Reboot device after update completes.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to QNAP devices to only trusted IP addresses

Configure firewall rules to block all external access to QNAP management ports (typically 8080, 443)

Disable Unnecessary Services

all

Turn off any unnecessary services and applications on QNAP devices

Disable SSH, Telnet, and other remote access services if not needed

🧯 If You Can't Patch

  • Immediately isolate affected devices from the internet and restrict network access
  • Implement strict network segmentation and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check firmware version in QTS/QuTS hero web interface under Control Panel > System > Firmware Update

Check Version:

ssh admin@qnap-ip 'cat /etc/config/uLinux.conf | grep version' or check web interface

Verify Fix Applied:

Verify firmware version is QTS 4.5.1.1540 build 20210107 or later, or QuTS hero h4.5.1.1582 build 20210217 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Suspicious process creation
  • Failed authentication attempts followed by successful command execution

Network Indicators:

  • Unusual outbound connections from QNAP devices
  • Traffic to known malicious IPs
  • Unexpected port scanning from QNAP devices

SIEM Query:

source="qnap_logs" AND ("command injection" OR "unauthorized command" OR suspicious_process="*sh" OR suspicious_process="*bash")

🔗 References

📤 Share & Export