CVE-2024-56808
Published: 11 February 2026
Summary
CVE-2024-56808 is a high-severity OS Command Injection (CWE-78) vulnerability in Qnap Media Streaming Add-On. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 19.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents command injection by validating and sanitizing user inputs to the Media Streaming add-on before they are processed as system commands.
Ensures timely remediation of the specific command injection flaw through patching to Media Streaming add-on version 500.1.1.6 or later.
Mitigates impact of exploited command injection by restricting privileges of local user accounts required for attack.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection (CWE-78) directly enables arbitrary OS command execution on Unix-based QNAP device (T1059.004) and supports local privilege escalation given low-priv access and high impact (T1068).
NVD Description
A command injection vulnerability has been reported to affect Media Streaming add-on. If an attacker gains local network access who have also gained a user account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed…
more
the vulnerability in the following version: Media Streaming add-on 500.1.1.6 ( 2024/08/02 ) and later
Deeper analysisAI
CVE-2024-56808 is a command injection vulnerability (CWE-78) affecting the Media Streaming add-on for QNAP devices. It enables attackers to execute arbitrary commands on the system. The vulnerability has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high impact potential with local access requirements.
An attacker must first obtain local network access and a user account on the affected system to exploit this vulnerability. Once these prerequisites are met, exploitation allows execution of arbitrary commands, potentially granting high levels of control over confidentiality, integrity, and availability of the system.
QNAP has addressed the issue in Media Streaming add-on version 500.1.1.6, released on 2024/08/02, and all later versions. Security practitioners should update affected installations immediately, as detailed in the vendor advisory at https://www.qnap.com/en/security-advisory/qsa-25-57.
Details
- CWE(s)