Impact
The vulnerability allows a remote attacker who has obtained a user account to exploit a command injection flaw in QNAP QuNetSwitch. By supplying crafted input, the attacker can execute arbitrary system commands, potentially taking full control of the affected device and compromising confidentiality, integrity, and availability of the network services it provides.
Affected Systems
The affected product is QNAP Systems Inc.'s QuNetSwitch appliance. All releases older than version 2.0.5.0906 are vulnerable. The fix has been applied in QuNetSwitch 2.0.5.0906 and later.
Risk and Exploitability
The CVSS score of 6.3 indicates a moderate severity, while an EPSS score of 1% suggests low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers need to first authenticate with a user account to exploit the flaw, implying that loss of account confidentiality or poor password policies can enable the exploitation. The available remediation from the vendor is a straightforward patch update.
OpenCVE Enrichment