CVE-2025-52864 (CNNVD-202601-735)
LOW
中文标题:
QNAP Systems QTS和QNAP Systems QuTS hero 安全漏洞
英文标题:
QTS, QuTS hero
CVSS分数:
1.3
发布时间:
2026-01-02 14:54:14
漏洞类型:
其他
状态:
PUBLISHED
数据质量分数:
0.40
数据版本:
v3
漏洞描述
中文描述:
QNAP Systems QTS和QNAP Systems QuTS hero都是中国台湾威联通科技(QNAP Systems)公司的一个具有数据存储与管理功能的软件。 QNAP Systems QTS和QNAP Systems QuTS hero存在安全漏洞,该漏洞源于缓冲区溢出,可能导致修改内存或进QuTS hero程崩溃。
英文描述:
A buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes. We have already fixed the vulnerability in the following versions: QTS 5.2.7.3256 build 20250913 and later QuTS hero h5.2.7.3256 build 20250913 and later QuTS hero h5.3.0.3192 build 20250716 and later
CWE类型:
CWE-120
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| QNAP Systems Inc. | QTS | - | < 5.2.7.3256 build 20250913 | - |
cpe:2.3:a:qnap_systems_inc.:qts:*:*:*:*:*:*:*:*
|
| QNAP Systems Inc. | QuTS hero | - | < h5.2.7.3256 build 20250913 | - |
cpe:2.3:a:qnap_systems_inc.:quts_hero:*:*:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.0.2737 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.0.2737:build_20240417:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.0.2782 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.0.2782:build_20240601:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.0.2789 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.0.2789:build_20240607:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.0.2802 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.0.2802:build_20240620:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.0.2823 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.0.2823:build_20240711:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.0.2851 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.0.2851:build_20240808:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.0.2860 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.0.2860:build_20240817:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.1.2929 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.1.2929:build_20241025:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.1.2940 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.1.2940:build_20241105:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.2.2952 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.2.2952:build_20241116:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.3.3006 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.3.3006:build_20250108:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.4.3070 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.4.3070:build_20250312:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.4.3079 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.4.3079:build_20250321:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.5.3138 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.5.3138:build_20250519:*:*:*:*:*:*
|
| qnap | quts_hero | h5.2.6.3195 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.2.6.3195:build_20250715:*:*:*:*:*:*
|
| qnap | quts_hero | h5.3.0.3115 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.3.0.3115:build_20250430:*:*:*:*:*:*
|
| qnap | quts_hero | h5.3.0.3145 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.3.0.3145:build_20250530:*:*:*:*:*:*
|
| qnap | quts_hero | h5.3.0.3192 | - | - |
cpe:2.3:o:qnap:quts_hero:h5.3.0.3192:build_20250716:*:*:*:*:*:*
|
| qnap | qts | 5.2.0.2737 | - | - |
cpe:2.3:o:qnap:qts:5.2.0.2737:build_20240417:*:*:*:*:*:*
|
| qnap | qts | 5.2.0.2744 | - | - |
cpe:2.3:o:qnap:qts:5.2.0.2744:build_20240424:*:*:*:*:*:*
|
| qnap | qts | 5.2.0.2782 | - | - |
cpe:2.3:o:qnap:qts:5.2.0.2782:build_20240601:*:*:*:*:*:*
|
| qnap | qts | 5.2.0.2802 | - | - |
cpe:2.3:o:qnap:qts:5.2.0.2802:build_20240620:*:*:*:*:*:*
|
| qnap | qts | 5.2.0.2823 | - | - |
cpe:2.3:o:qnap:qts:5.2.0.2823:build_20240711:*:*:*:*:*:*
|
| qnap | qts | 5.2.0.2851 | - | - |
cpe:2.3:o:qnap:qts:5.2.0.2851:build_20240808:*:*:*:*:*:*
|
| qnap | qts | 5.2.0.2860 | - | - |
cpe:2.3:o:qnap:qts:5.2.0.2860:build_20240817:*:*:*:*:*:*
|
| qnap | qts | 5.2.1.2930 | - | - |
cpe:2.3:o:qnap:qts:5.2.1.2930:build_20241025:*:*:*:*:*:*
|
| qnap | qts | 5.2.2.2950 | - | - |
cpe:2.3:o:qnap:qts:5.2.2.2950:build_20241114:*:*:*:*:*:*
|
| qnap | qts | 5.2.3.3006 | - | - |
cpe:2.3:o:qnap:qts:5.2.3.3006:build_20250108:*:*:*:*:*:*
|
| qnap | qts | 5.2.4.3070 | - | - |
cpe:2.3:o:qnap:qts:5.2.4.3070:build_20250312:*:*:*:*:*:*
|
| qnap | qts | 5.2.4.3079 | - | - |
cpe:2.3:o:qnap:qts:5.2.4.3079:build_20250321:*:*:*:*:*:*
|
| qnap | qts | 5.2.4.3092 | - | - |
cpe:2.3:o:qnap:qts:5.2.4.3092:build_20250403:*:*:*:*:*:*
|
| qnap | qts | 5.2.5.3145 | - | - |
cpe:2.3:o:qnap:qts:5.2.5.3145:build_20250526:*:*:*:*:*:*
|
| qnap | qts | 5.2.6.3195 | - | - |
cpe:2.3:o:qnap:qts:5.2.6.3195:build_20250715:*:*:*:*:*:*
|
| qnap | qts | 5.2.6.3229 | - | - |
cpe:2.3:o:qnap:qts:5.2.6.3229:build_20250818:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题
OTHER
cve.org
访问
cve.org
CVSS评分详情
4.0 (cna)
LOW
1.3
CVSS向量:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U
机密性
LOW
完整性
LOW
可用性
LOW
后续系统影响 (Subsequent):
机密性
NONE
完整性
NONE
可用性
NONE
时间信息
发布时间:
2026-01-02 14:54:14
修改时间:
2026-01-02 19:21:12
创建时间:
2026-01-12 02:11:55
更新时间:
2026-01-20 03:10:51
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-52864 |
2026-01-04 02:04:15 | 2026-01-12 02:11:55 |
| NVD | nvd_CVE-2025-52864 |
2026-01-06 03:00:03 | 2026-01-12 02:27:52 |
| CNNVD | cnnvd_CNNVD-202601-735 |
2026-01-11 06:15:06 | 2026-01-12 02:38:15 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
ZH
EN
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2026-01-12 02:38:15
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202601-735; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202601-735
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2026-01-12 02:27:52
affected_products_count: 3 → 36; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 3 -> 36
- data_sources: ['cve'] -> ['cve', 'nvd']