Advisory Details

July 31st, 2025

(Pwn2Own) QNAP QHora-322 Improper Restriction of Communication Channel to Intended Endpoints Remote Code Execution Vulnerability

ZDI-25-739
ZDI-CAN-25634

CVE ID
CVSS SCORE 6.6, AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS QNAP
AFFECTED PRODUCTS QHora-322
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of QNAP QHora-322 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.

The specific flaw exists within the SSH daemon. The issue results from exposing SSH on the WAN side of the router by installing a debug firmware build, which an attacker can accomplish by abusing other vulnerabilities. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.


ADDITIONAL DETAILS QNAP has issued an update to correct this vulnerability. More details can be found at:
https://www.qnap.com/en-us/security-advisories
DISCLOSURE TIMELINE
  • 2024-12-02 - Vulnerability reported to vendor
  • 2025-07-31 - Coordinated public release of advisory
  • 2025-07-31 - Advisory Updated
CREDIT Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam)
BACK TO ADVISORIES