A buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to modify memory or crash processes.
We have already fixed the vulnerability in the following version: QTS 5.2.8.3332 build 20251128 and later
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.0.2737-build_20240417"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.0.2744-build_20240424"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.0.2782-build_20240601"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.0.2802-build_20240620"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.0.2823-build_20240711"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.0.2851-build_20240808"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.0.2860-build_20240817"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.1.2930-build_20241025"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.2.2950-build_20241114"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.3.3006-build_20250108"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.4.3070-build_20250312"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.4.3079-build_20250321"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.4.3092-build_20250403"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.5.3145-build_20250526"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.6.3195-build_20250715"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.6.3229-build_20250818"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.7.3256-build_20250913"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.2.7.3297-build_20251024"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.0.2737-build_20240417"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.0.2782-build_20240601"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.0.2789-build_20240607"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.0.2802-build_20240620"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.0.2823-build_20240711"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.0.2851-build_20240808"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.0.2860-build_20240817"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.1.2929-build_20241025"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.1.2940-build_20241105"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.2.2952-build_20241116"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.3.3006-build_20250108"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.4.3070-build_20250312"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.4.3079-build_20250321"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.5.3138-build_20250519"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.6.3195-build_20250715"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.7.3256-build_20250913"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.2.7.3297-build_20251024"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.3.0.3115-build_20250430"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.3.0.3145-build_20250530"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h5.3.0.3192-build_20250716"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-62852.json"