CVE-2024-14026
Published: 11 March 2026
Summary
CVE-2024-14026 is a high-severity OS Command Injection (CWE-78) vulnerability in Qnap Quts Hero. Its CVSS base score is 7.8 (High).
Operationally, ranked at the 2.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the command injection vulnerability by requiring timely flaw remediation through patching to the fixed QNAP versions, preventing exploitation.
Prevents command injection by enforcing validation of user inputs at system interfaces before they are processed as commands.
Limits the impact of arbitrary command execution by ensuring user accounts operate with least privilege, reducing potential damage from local network exploitation.
NVD Description
A command injection vulnerability has been reported to affect several QNAP operating system versions. If an attacker gains local network access who have also gained a user account, they can then exploit the vulnerability to execute arbitrary commands. We have…
more
already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QTS 5.2.3.3006 build 20250108 and later QuTS hero h5.1.9.2954 build 20241120 and later QuTS hero h5.2.3.3006 build 20250108 and later
Deeper analysisAI
CVE-2024-14026 is a command injection vulnerability (CWE-78) affecting several versions of QNAP operating systems, including QTS and QuTS hero. Published on 2026-03-11, it carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H), indicating high impact potential with low complexity and privileges required.
The vulnerability can be exploited by an attacker who has obtained local network access and a user account on the affected system. Successful exploitation allows the execution of arbitrary commands, enabling high levels of compromise in confidentiality, integrity, and availability.
QNAP has fixed the vulnerability in QTS 5.1.9.2954 build 20241120 and later, QTS 5.2.3.3006 build 20250108 and later, QuTS hero h5.1.9.2954 build 20241120 and later, and QuTS hero h5.2.3.3006 build 20250108 and later. Additional details are available in the QNAP security advisory at https://www.qnap.com/en/security-advisory/qsa-24-54.
Details
- CWE(s)