A use of hard-coded credentials vulnerability has been reported to affect QuNetSwitch. The remote attackers can then exploit the vulnerability to gain unauthorized access.
We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.5.0906 and later
We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.5.0906 and later
Subscriptions
No data.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-26-11 |
|
History
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use of hard-coded credentials vulnerability has been reported to affect QuNetSwitch. The remote attackers can then exploit the vulnerability to gain unauthorized access. We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later | |
| Title | QuNetSwitch | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2026-03-20T16:21:25.342Z
Reserved: 2026-01-13T07:49:08.784Z
Link: CVE-2026-22900
No data.
Status : Received
Published: 2026-03-20T17:16:44.467
Modified: 2026-03-20T17:16:44.467
Link: CVE-2026-22900
No data.
OpenCVE Enrichment
No data.
Weaknesses