Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22894: CWE-22 in QNAP Systems Inc. File Station 5

0
Low
VulnerabilityCVE-2026-22894cvecve-2026-22894cwe-22
Published: Wed Feb 11 2026 (02/11/2026, 12:15:21 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: File Station 5

Description

A path traversal vulnerability has been reported to affect File Station 6. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.5190 and later

AI-Powered Analysis

AILast updated: 02/11/2026, 13:01:08 UTC

Technical Analysis

CVE-2026-22894 is a path traversal vulnerability classified under CWE-22 that affects QNAP Systems Inc.'s File Station 5 software, specifically versions 5.5.x. File Station is a file management application commonly used on QNAP NAS devices to facilitate file access and sharing. The vulnerability allows an attacker who has already obtained a valid user account on the system to manipulate file path inputs to access files outside the intended directory scope. This can lead to unauthorized reading of sensitive system files or user data that should otherwise be inaccessible. The vulnerability does not require additional user interaction and can be exploited remotely over the network, given the attacker has valid credentials. The CVSS 4.0 base score is 1.3, reflecting low severity due to limited impact and the prerequisite of authenticated access. The vendor has addressed this vulnerability in File Station 5 version 5.5.6.5190 and later. No public exploits have been reported, but the presence of this flaw poses a risk of data leakage if attackers compromise user accounts. The flaw arises from insufficient validation of file path inputs, allowing directory traversal sequences to escape the intended file system boundaries.

Potential Impact

For European organizations, this vulnerability primarily threatens the confidentiality of data stored on QNAP NAS devices running vulnerable versions of File Station 5. Unauthorized access to system or user files could lead to exposure of sensitive corporate information, intellectual property, or personal data, potentially violating GDPR requirements. Although the vulnerability requires an attacker to have valid user credentials, compromised or weak user accounts could be leveraged to exploit this flaw. The impact on system integrity and availability is minimal, as the vulnerability only allows reading files, not modifying or deleting them. However, the exposure of sensitive data can have significant reputational and regulatory consequences. Organizations in sectors such as finance, healthcare, and critical infrastructure that rely on QNAP NAS for file storage and sharing are particularly at risk. The low CVSS score suggests the threat is not critical but still warrants timely remediation to prevent potential data breaches.

Mitigation Recommendations

1. Immediately upgrade all QNAP NAS devices running File Station 5 to version 5.5.6.5190 or later where the vulnerability is patched. 2. Enforce strong authentication policies, including complex passwords and multi-factor authentication, to reduce the risk of account compromise. 3. Limit user account privileges strictly to the minimum necessary to reduce the attack surface. 4. Monitor file access logs for unusual or unauthorized attempts to access sensitive files or directories outside normal usage patterns. 5. Implement network segmentation to restrict access to NAS devices only to trusted internal networks and users. 6. Regularly audit NAS device configurations and installed software versions to ensure compliance with security policies. 7. Educate users about phishing and credential theft risks to prevent initial account compromise. 8. Consider deploying endpoint detection and response (EDR) solutions that can alert on suspicious activities related to NAS access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2026-01-13T07:49:08.783Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698c7a214b57a58fa195d103

Added to database: 2/11/2026, 12:46:25 PM

Last enriched: 2/11/2026, 1:01:08 PM

Last updated: 2/11/2026, 6:30:56 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats