Description
A path traversal vulnerability has been reported to affect File Station 6. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.

We have already fixed the vulnerability in the following version:
File Station 5 5.5.6.5190 and later
Published: 2026-02-11
Score: 1.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Remote Disclosure of System Files
Action: Apply Patch
AI Analysis

Impact

A path‑traversal flaw in QNAP File Station 5 permits a remote attacker who has obtained a valid user account to read files that should not be accessible, exposing system data to disclosure. The weakness stems from inadequate validation of user‑supplied file paths, a classic CWE‑22 scenario. The impact is the potential compromise of confidentiality for any files the attacker can traverse to, such as configuration or sensitive documents, without affecting integrity or availability directly.

Affected Systems

Versions of QNAP File Station 5 earlier than 5.5.6.5190 are affected. Hardware running this firmware is vulnerable until an upgrade to 5.5.6.5190 or later is applied.

Risk and Exploitability

The CVSS score of 1.3 reflects the low impact and the requirement that the attacker must already have legitimate user credentials or a compromised account. The EPSS score of less than 1% indicates a very low probability of exploitation in the wild, and the vulnerability is not reported as a known exploited threat in CISA’s KEV catalog. The attack would involve authenticating to the system first and then manipulating file paths to read unintended files, a process that does not require additional privileges beyond those granted to the user account.

Generated by OpenCVE AI on April 17, 2026 at 20:22 UTC.

Remediation

Vendor Solution

We have already fixed the vulnerability in the following version: File Station 5 5.5.6.5190 and later


OpenCVE Recommended Actions

  • Upgrade File Station to version 5.5.6.5190 or later.
  • If an upgrade cannot be performed immediately, disable remote file access services or restrict them to trusted networks to prevent unauthorised traversal attempts.
  • Enable detailed logging for file access and regularly review logs for unusual read patterns that may indicate exploitation.

Generated by OpenCVE AI on April 17, 2026 at 20:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Qnap
Qnap file Station
CPEs cpe:2.3:a:qnap:file_station:*:*:*:*:*:*:*:*
Vendors & Products Qnap
Qnap file Station
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Qnap Systems
Qnap Systems file Station 5
Vendors & Products Qnap Systems
Qnap Systems file Station 5

Wed, 11 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability has been reported to affect File Station 6. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.5190 and later
Title File Station 5
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 1.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U'}


Subscriptions

Qnap File Station
Qnap Systems File Station 5
cve-icon MITRE

Status: PUBLISHED

Assigner: qnap

Published:

Updated: 2026-02-11T16:36:57.274Z

Reserved: 2026-01-13T07:49:08.783Z

Link: CVE-2026-22894

cve-icon Vulnrichment

Updated: 2026-02-11T16:36:54.939Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-11T13:15:58.937

Modified: 2026-02-12T19:40:11.477

Link: CVE-2026-22894

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:30:15Z

Weaknesses