Monday, April 28, 2025
Homecyber securityPoC Exploit Released for QNAP QTS zero-day RCE Flaw

PoC Exploit Released for QNAP QTS zero-day RCE Flaw

Published on

SIEM as a Service

Follow Us on Google News

Researchers have shown a proof-of-concept (PoC) attack for a zero-day remote code execution (RCE) flaw in the QTS operating system from QNAP.

Users of QNAP’s Network-Attached Storage (NAS) devices, which are common in both small and big business settings, are in grave danger because of this flaw, which has been named CVE-2024-27130.

Network-attached storage (NAS) devices are specialized computers that can store and handle a lot of data.

- Advertisement - Google News

ANYRUN malware sandbox’s 8th Birthday Special Offer: Grab 6 Months of Free Service

Usually, more than one user can access and use the same NAS device.

Cybercriminals want to get into these devices because they are designed to do fast input/output and networking.

The fact that NAS systems can be used by multiple people and are commonly found in many business settings makes it even more important to have strong security measures in place.
The fact that NAS systems can be used by multiple people and are commonly found in many business settings makes strong security measures even more important.

The Vulnerability: CVE-2024-27130

According to the Watchtower Lab reports, the flaw made public, CVE-2024-27130, is a stack overflow bug that can run code from afar without authentication.

This bug was found in the QTS operating system, which is based on Linux but has a lot of extra software, like web-based user interfaces and support for Docker containers.

Researchers began an in-depth study of QNAP’s QTS, QuTSCloud, and QTS hero models. Fifteen bugs were found, with CVE-2024-27130 being the most important.

Because it is written in C, the software of the QTS system was found to be weak.
Because it is written in C, the software of the QTS system was found to be weak.

The experts said that the codebase has had security holes in the past and that some parts have been used for more than ten years.

There’s some PHP present, although it doesn’t execute. Classy.
There’s some PHP present, although it doesn’t execute. Classy.

Details of Exploitation

The proof-of-concept exploit shows how an attacker can use the CVE-2024-27130 flaw to take over a NAS device.

NAS users might do if they want to share a file with a user who doesn’t have a NAS account
NAS users might do if they want to share a file with a user who doesn’t have a NAS account

The exploit includes sending a specially made request to the NAS device.

This causes a stack overflow, which lets the attacker run any code they want.

you can set expiry or even require a password for the shared file.
you can set expiry or even require a password for the shared file.

The researchers explained how the hack worked, showing how to use a debugger to change the program counter and other vital registers.

The proof-of-concept exploit was shown in a controlled setting with Address Space Layout Randomization (ASLR) turned off, but the researchers stressed how this flaw could be used in the real world.

They pointed out that NAS users often share files with people outside of their network, which means that an attacker could obtain the session identifier (SSID) needed to use the hack.

Mitigation and Recommendations

The flaw has not been fixed as of the time it was reported.

The researchers told QNAP what they found and are now working to find an answer.

Users should limit file-sharing for now, monitor their NAS devices for strange behavior, and quickly install any available security updates.

The public revelation of the CVE-2024-27130 vulnerability and the proof-of-concept exploit that goes with it shows how hard it is to keep network-attached storage devices safe.

These devices are still very important for managing and sharing data, so both the companies that make them and the people who use them need to prioritize security and monitor for new threats.


Visit the researchers’ GitHub repository for more details and to access the PoC exploit scripts. Stay tuned for more information about this critical security problem.

Free Webinar on Live API Attack Simulation: Book Your Seat | Start protecting your APIs from hackers

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...