CVE-2025-29878

6.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in QNAP File Station 5 allows authenticated attackers to cause denial-of-service conditions. This affects users running vulnerable versions of File Station 5 on QNAP NAS devices. Attackers need valid user credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • QNAP File Station 5
Versions: Versions prior to 5.5.6.4907
Operating Systems: QTS (QNAP Turbo NAS Operating System)
Default Config Vulnerable: ⚠️ Yes
Notes: File Station is typically enabled by default on QNAP NAS devices. Requires File Station 5 specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of File Station functionality, potentially affecting file access and management services on the NAS device.

🟠

Likely Case

Temporary unavailability of File Station web interface and file management services until service restart.

🟢

If Mitigated

Minimal impact with proper access controls limiting authenticated users and monitoring for DoS attempts.

🌐 Internet-Facing: MEDIUM - Requires authentication but internet-facing instances are accessible to attackers with credentials.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials can still cause service disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but the vulnerability itself is simple to trigger once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: File Station 5 5.5.6.4907 and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-25-19

Restart Required: Yes

Instructions:

1. Log into QNAP App Center. 2. Check for updates to File Station 5. 3. Update to version 5.5.6.4907 or later. 4. Restart the File Station service or reboot the NAS.

🔧 Temporary Workarounds

Disable File Station

all

Temporarily disable File Station service if not required

Navigate to Control Panel > Applications > App Center > Installed Apps, find File Station and click 'Disable'

Restrict Access

all

Limit File Station access to trusted IP addresses only

Navigate to Control Panel > Security > Security Level > Allow/Deny List to configure IP restrictions

🧯 If You Can't Patch

  • Implement strict access controls and limit File Station users to only necessary personnel
  • Monitor for DoS attempts and implement rate limiting if supported

🔍 How to Verify

Check if Vulnerable:

Check File Station version in App Center > Installed Apps. If version is below 5.5.6.4907, system is vulnerable.

Check Version:

Check via QNAP web interface: App Center > Installed Apps > File Station

Verify Fix Applied:

Confirm File Station version is 5.5.6.4907 or higher in App Center > Installed Apps.

📡 Detection & Monitoring

Log Indicators:

  • Multiple authentication attempts followed by File Station service crashes
  • Error logs containing NULL pointer or segmentation fault references

Network Indicators:

  • Unusual traffic patterns to File Station web interface followed by service unavailability

SIEM Query:

source="qnap_nas" AND (event="service_crash" OR event="segmentation_fault") AND process="filestation"

🔗 References

📤 Share & Export