CVE-2025-54162
📋 TL;DR
This path traversal vulnerability in QNAP File Station 5 allows authenticated administrators to read arbitrary files on the system. Attackers who compromise administrator credentials can access sensitive system data. Only QNAP NAS devices running vulnerable File Station versions are affected.
💻 Affected Systems
- QNAP File Station 5
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise through reading sensitive configuration files, credentials, or system files that enable privilege escalation or lateral movement.
Likely Case
Data exfiltration of sensitive files, configuration exposure, or credential harvesting from accessible system files.
If Mitigated
Limited impact if administrator accounts are properly secured with strong credentials and multi-factor authentication.
🎯 Exploit Status
Exploitation requires administrator credentials but uses simple path traversal techniques once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: File Station 5 5.5.6.5068 and later
Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-26-03
Restart Required: Yes
Instructions:
1. Log into QNAP NAS web interface as administrator. 2. Go to App Center. 3. Check for updates to File Station. 4. Install version 5.5.6.5068 or later. 5. Restart the NAS if prompted.
🔧 Temporary Workarounds
Disable File Station
allTemporarily disable File Station service if patching is not immediately possible
Restrict Administrator Access
allImplement strict access controls for administrator accounts and enable multi-factor authentication
🧯 If You Can't Patch
- Disable File Station service entirely through QNAP App Center
- Implement network segmentation to isolate QNAP devices from sensitive networks
🔍 How to Verify
Check if Vulnerable:
Check File Station version in QNAP App Center. If version is below 5.5.6.5068, the system is vulnerable.
Check Version:
No CLI command available. Check via QNAP web interface: App Center → Installed Apps → File Station
Verify Fix Applied:
Confirm File Station version is 5.5.6.5068 or higher in App Center after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in File Station logs
- Multiple failed authentication attempts followed by successful admin login
- Access to system directories via File Station
Network Indicators:
- Unusual outbound data transfers from QNAP device
- Multiple requests to File Station API with path traversal patterns
SIEM Query:
source="qnap" AND (event="file_access" AND path CONTAINS "../") OR (auth_failure AND auth_success AND user="admin")