Skip to main content

CVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5

High
VulnerabilityCVE-2025-47206cvecve-2025-47206cwe-787
Published: Mon Aug 18 2025 (08/18/2025, 08:27:55 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: File Station 5

Description

An out-of-bounds write vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to modify or corrupt memory. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4933 and later

AI-Powered Analysis

AILast updated: 08/18/2025, 08:47:47 UTC

Technical Analysis

CVE-2025-47206 is a high-severity vulnerability classified as CWE-787 (Out-of-Bounds Write) affecting QNAP Systems Inc.'s File Station 5 software, specifically versions 5.5.x prior to 5.5.6.4933. File Station 5 is a file management application commonly used on QNAP NAS devices to facilitate file sharing and management over a network. The vulnerability arises from improper bounds checking during memory operations, allowing a remote attacker who has already obtained a user account on the system to perform out-of-bounds writes. This can lead to memory corruption, potentially enabling arbitrary code execution, system crashes, or data integrity compromise. The CVSS v4.0 base score is 7.1, indicating a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L - meaning limited privileges are needed, i.e., a user account), no user interaction (UI:N), and high impact on availability (VA:H). The vulnerability does not affect confidentiality or integrity directly according to the vector, but memory corruption could indirectly lead to broader impacts. The vendor has addressed the issue in File Station 5 version 5.5.6.4933 and later. No known exploits are currently reported in the wild, but the presence of a user account requirement means attackers must first compromise credentials or leverage weak authentication mechanisms to exploit this flaw. Given the nature of NAS devices as centralized storage and file sharing platforms, exploitation could disrupt business operations, cause data loss, or serve as a foothold for further network compromise.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of QNAP NAS devices in enterprises, SMBs, and even critical infrastructure sectors for centralized file storage and collaboration. Successful exploitation could lead to denial of service through system crashes or memory corruption, impacting availability of critical data. Additionally, attackers might leverage this vulnerability to execute arbitrary code, potentially leading to data theft, ransomware deployment, or lateral movement within corporate networks. Given the requirement for a user account, organizations with weak credential management or exposed management interfaces are particularly vulnerable. Disruption of file services can affect business continuity, regulatory compliance (e.g., GDPR mandates on data integrity and availability), and cause reputational damage. The lack of known exploits currently provides a window for proactive patching, but the high CVSS score and ease of exploitation (low complexity, no user interaction) underscore the urgency of mitigation.

Mitigation Recommendations

European organizations should prioritize upgrading File Station 5 to version 5.5.6.4933 or later immediately to remediate the vulnerability. Beyond patching, organizations must enforce strong credential policies, including multi-factor authentication (MFA) for all user accounts accessing QNAP NAS devices to reduce the risk of account compromise. Network segmentation should be implemented to restrict access to NAS management interfaces only to trusted internal networks or VPN users. Monitoring and logging of access to File Station should be enhanced to detect anomalous activities indicative of exploitation attempts. Additionally, organizations should conduct regular vulnerability assessments and penetration testing focused on NAS devices. Disabling or restricting remote access to File Station where not required will further reduce exposure. Backup strategies must be reviewed to ensure rapid recovery in case of data corruption or ransomware attacks stemming from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
qnap
Date Reserved
2025-05-02T05:58:18.475Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a2e528ad5a09ad00ab8b05

Added to database: 8/18/2025, 8:32:40 AM

Last enriched: 8/18/2025, 8:47:47 AM

Last updated: 8/18/2025, 12:20:23 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats