Description
A command injection vulnerability has been reported to affect QuNetSwitch. If a remote attacker gains a user account, they can then exploit the vulnerability to execute arbitrary commands.

We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.5.0906 and later
Published: 2026-03-20
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch immediately
AI Analysis

Impact

The vulnerability allows a remote attacker who has obtained a user account to exploit a command injection flaw in QNAP QuNetSwitch. By supplying crafted input, the attacker can execute arbitrary system commands, potentially taking full control of the affected device and compromising confidentiality, integrity, and availability of the network services it provides.

Affected Systems

The affected product is QNAP Systems Inc.'s QuNetSwitch appliance. All releases older than version 2.0.5.0906 are vulnerable. The fix has been applied in QuNetSwitch 2.0.5.0906 and later.

Risk and Exploitability

The CVSS score of 6.3 indicates a moderate severity, while an EPSS score of 1% suggests low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers need to first authenticate with a user account to exploit the flaw, implying that loss of account confidentiality or poor password policies can enable the exploitation. The available remediation from the vendor is a straightforward patch update.

Generated by OpenCVE AI on March 25, 2026 at 23:54 UTC.

Remediation

Vendor Solution

We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later


OpenCVE Recommended Actions

  • Update QuNetSwitch to version 2.0.5.0906 or later
  • Restrict remote access to the device and enforce strong authentication
  • Disable unnecessary services or ports on the appliance
  • Monitor system logs for evidence of unauthorized command execution

Generated by OpenCVE AI on March 25, 2026 at 23:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Qnap
Qnap qunetswitch
CPEs cpe:2.3:a:qnap:qunetswitch:*:*:*:*:*:*:*:*
Vendors & Products Qnap
Qnap qunetswitch
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Qnap Systems
Qnap Systems qunetswitch
Vendors & Products Qnap Systems
Qnap Systems qunetswitch

Fri, 20 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability has been reported to affect QuNetSwitch. If a remote attacker gains a user account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later
Title QuNetSwitch
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U'}


Subscriptions

Qnap Qunetswitch
Qnap Systems Qunetswitch
cve-icon MITRE

Status: PUBLISHED

Assigner: qnap

Published:

Updated: 2026-03-25T14:05:15.945Z

Reserved: 2026-01-13T07:49:08.784Z

Link: CVE-2026-22901

cve-icon Vulnrichment

Updated: 2026-03-25T14:05:11.512Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T17:16:44.627

Modified: 2026-03-25T20:57:06.400

Link: CVE-2026-22901

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:20:41Z

Weaknesses