A command injection vulnerability has been reported to affect QuNetSwitch. If a local attacker gains an administrator account, they can then exploit the vulnerability to execute arbitrary commands.
We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.5.0906 and later
We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.5.0906 and later
Subscriptions
No data.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-26-11 |
|
History
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability has been reported to affect QuNetSwitch. If a local attacker gains an administrator account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later | |
| Title | QuNetSwitch | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2026-03-20T16:25:00.669Z
Reserved: 2026-01-13T07:49:08.784Z
Link: CVE-2026-22902
No data.
Status : Received
Published: 2026-03-20T17:16:44.783
Modified: 2026-03-20T17:16:44.783
Link: CVE-2026-22902
No data.
OpenCVE Enrichment
No data.
Weaknesses