Advisory Details

July 31st, 2025

(Pwn2Own) QNAP TS-464 rsync Daemon Command Injection Remote Code Execution Vulnerability

ZDI-25-760
ZDI-CAN-25536

CVE ID CVE-2024-50388
CVSS SCORE 7.5, AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS QNAP
AFFECTED PRODUCTS TS-464
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of QNAP TS-464 devices. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of the provided username and password during authentication. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of admin.

ADDITIONAL DETAILS QNAP has issued an update to correct this vulnerability. More details can be found at:
https://www.qnap.com/en/security-advisory/qsa-24-41
DISCLOSURE TIMELINE
  • 2024-12-02 - Vulnerability reported to vendor
  • 2025-07-31 - Coordinated public release of advisory
  • 2025-07-31 - Advisory Updated
CREDIT Team Viettel
BACK TO ADVISORIES