CVE-2025-66277

9.8 CRITICAL

📋 TL;DR

This CVE describes a link following vulnerability in QNAP operating systems that allows remote attackers to traverse the file system to unintended locations. The vulnerability affects multiple QNAP OS versions and could allow attackers to access sensitive files or directories they shouldn't have access to.

💻 Affected Systems

Products:
  • QNAP QTS
  • QNAP QuTS hero
Versions: Versions before QTS 5.2.8.3350 build 20251216, QuTS hero h5.3.2.3354 build 20251225, and QuTS hero h5.2.8.3350 build 20251216
Operating Systems: QNAP QTS, QNAP QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected versions are vulnerable. The vulnerability is in the operating system itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive system files, configuration files, or user data, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Attackers could read sensitive configuration files, access user data, or potentially write to certain directories to achieve further exploitation.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to the affected QNAP device only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Based on the description, this appears to be a directory traversal vulnerability that could be exploited remotely without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QTS 5.2.8.3350 build 20251216 or later, QuTS hero h5.3.2.3354 build 20251225 or later, QuTS hero h5.2.8.3350 build 20251216 or later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-26-05

Restart Required: Yes

Instructions:

1. Log into QNAP web interface. 2. Go to Control Panel > System > Firmware Update. 3. Check for updates and install the latest version. 4. Reboot the device after update completes.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to QNAP devices to only trusted internal networks

Disable External Access

all

Disable any port forwarding, UPnP, or external access features

🧯 If You Can't Patch

  • Isolate QNAP devices on a separate VLAN with strict firewall rules
  • Implement network monitoring and alerting for unusual file access patterns

🔍 How to Verify

Check if Vulnerable:

Check current QNAP OS version via web interface: Control Panel > System > Firmware Update

Check Version:

ssh admin@qnap-ip 'cat /etc/version' or check via web interface

Verify Fix Applied:

Verify the installed version matches or exceeds the patched versions listed in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in system logs
  • Multiple failed directory traversal attempts

Network Indicators:

  • Unusual HTTP requests with directory traversal patterns (../ sequences)

SIEM Query:

source="qnap-logs" AND (event="file_access" AND path="*../*") OR (http_request="*../*")

🔗 References

📤 Share & Export