CVE-2025-29886

6.5 MEDIUM

📋 TL;DR

A NULL pointer dereference vulnerability in QNAP File Station 5 allows authenticated remote attackers to cause denial-of-service by crashing the service. This affects all QNAP NAS devices running vulnerable versions of File Station 5.

💻 Affected Systems

Products:
  • QNAP File Station 5
Versions: All versions before 5.5.6.4907
Operating Systems: QTS, QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: Affects QNAP NAS devices with File Station 5 enabled. Requires user authentication to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete File Station service crash requiring manual restart, disrupting file sharing and management capabilities for all users.

🟠

Likely Case

Temporary service disruption affecting file access and management until service automatically restarts or is manually restored.

🟢

If Mitigated

Minimal impact with proper authentication controls and monitoring in place to detect and respond to DoS attempts.

🌐 Internet-Facing: MEDIUM - Requires authenticated access but internet-facing instances are more exposed to credential-based attacks.
🏢 Internal Only: LOW - Still requires authenticated access and internal networks typically have better access controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires valid user credentials. Exploitation likely involves sending specially crafted requests to trigger the NULL pointer dereference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: File Station 5 5.5.6.4907 and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-25-19

Restart Required: Yes

Instructions:

1. Log into QNAP NAS web interface. 2. Go to App Center. 3. Check for updates. 4. Update File Station 5 to version 5.5.6.4907 or later. 5. Restart the File Station service or reboot the NAS.

🔧 Temporary Workarounds

Disable File Station

linux

Temporarily disable File Station service if not required

ssh admin@nas_ip
sudo /etc/init.d/file_station.sh stop

Restrict User Access

all

Limit File Station access to only necessary users

🧯 If You Can't Patch

  • Implement strict access controls and monitor for suspicious authentication attempts
  • Deploy network segmentation to isolate File Station from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check File Station version in QNAP App Center or via SSH: cat /etc/config/uLinux.conf | grep file_station_version

Check Version:

cat /etc/config/uLinux.conf | grep file_station_version

Verify Fix Applied:

Verify File Station version is 5.5.6.4907 or higher and service is running normally

📡 Detection & Monitoring

Log Indicators:

  • File Station service crash logs
  • Multiple failed authentication attempts followed by service disruption
  • Unusual user activity patterns

Network Indicators:

  • Unusual burst of requests to File Station endpoints
  • Traffic patterns suggesting DoS attempts

SIEM Query:

source="qnap_nas" AND (event="service_crash" AND service="file_station") OR (event="auth_failure" AND user!="" AND destination_service="file_station")

🔗 References

📤 Share & Export