This improper input validation vulnerability allows remote attackers to inject arbitrary code to the system. To fix the vulnerability, QNAP recommend updating QTS to their latest versions.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
| https://www.qnap.com/zh-tw/security-advisory/nas-201911-25 | Vendor Advisory |
| http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
| https://www.qnap.com/zh-tw/security-advisory/nas-201911-25 | Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-7193 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-12-05 17:15
Updated : 2025-10-27 17:15
NVD link : CVE-2019-7193
Mitre link : CVE-2019-7193
CVE.ORG link : CVE-2019-7193
JSON object : View
Products Affected
qnap
- qts
CWE
