Security ID : QSA-26-05
Multiple Vulnerabilities in QTS and QuTS hero
Release date : February 12, 2026
CVE identifier : CVE-2025-47205 | CVE-2025-58466 | CVE-2025-66277
Affected products: QTS 5.2.x, QuTS hero h5.2.x
Severity
Important
Status
Resolved
Summary
Multiple vulnerabilities has been reported to affect certain QNAP operating system versions:
- CVE-2025-58466: Use of uninitialized variable vulnerability
If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to cause denial-of-service (DoS) conditions or modify control flow in unexpected ways. - CVE-2025-47205: NULL pointer dereference vulnerability
If a remote attacker gains access to an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. - CVE-2025-66277: Link following vulnerability
If exploited, remote attackers can traverse the file system to unintended locations.
We have already fixed the vulnerabilities in the following versions:
| Affected Product | Fixed Version |
| QTS 5.2.x | QTS 5.2.8.3350 build 20251216 and later |
| QuTS hero h5.2.x | QuTS hero h5.2.8.3350 build 20251216 and later |
Recommendation
To secure your device, we recommend regularly updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.
Updating QTS or QuTS hero
- Log in to QTS or QuTS hero as an administrator.
- Go to Control Panel > System > Firmware Update.
- Under Live Update, click Check for Update.
The system downloads and installs the latest available update.
Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.
Attachment
Acknowledgements:
coral
Theori, with Xint
Revision History:
V1.0 (February 12, 2026) - Published