Cyber Posture

CVE-2025-30264

HighRCE

Published: 29 August 2025

Published
29 August 2025
Modified
22 September 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0028 51.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-30264 is a high-severity Command Injection (CWE-77) vulnerability in Qnap Qts. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 48.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2025-30264 by requiring timely application of vendor patches to the fixed QNAP QTS and QuTS hero versions.

prevent

Prevents command injection exploitation in QNAP OS by enforcing validation and sanitization of all user inputs to block arbitrary command execution.

prevent

Reduces impact of arbitrary command execution by authenticated users by restricting accounts to least privileges necessary on QNAP systems.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Authenticated command injection enables remote arbitrary Unix command execution on network-accessible QNAP device.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A command injection vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the…

more

following versions: QTS 5.2.5.3145 build 20250526 and later QuTS hero h5.2.5.3138 build 20250519 and later

Deeper analysisAI

CVE-2025-30264 is a command injection vulnerability (CWE-77, CWE-78) affecting several versions of QNAP's QTS and QuTS hero operating systems. It allows arbitrary command execution and has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant confidentiality, integrity, and availability impacts.

A remote attacker who has already obtained a valid user account on the targeted QNAP device can exploit this vulnerability to execute arbitrary commands. The low attack complexity and privileges required (low) enable exploitation over the network without user interaction, potentially leading to full system compromise.

QNAP's security advisory (QSA-25-21) states that the vulnerability has been fixed in QTS 5.2.5.3145 build 20250526 and later, as well as QuTS hero h5.2.5.3138 build 20250519 and later. Security practitioners should prioritize updating affected systems to these or newer versions to mitigate the risk.

Details

CWE(s)

Affected Products

qnap
qts
5.2.0.2737, 5.2.0.2744, 5.2.0.2782, 5.2.0.2802, 5.2.0.2823
qnap
quts hero
h5.2.0.2737, h5.2.0.2782, h5.2.0.2789, h5.2.0.2802, h5.2.0.2823

CVEs Like This One

CVE-2024-14026Same product: Qnap Qts
CVE-2024-13086Same product: Qnap Qts
CVE-2025-62849Same product: Qnap Qts
CVE-2025-59385Same product: Qnap Qts
CVE-2025-9110Same product: Qnap Qts
CVE-2025-66277Same product: Qnap Qts
CVE-2025-30273Same product: Qnap Qts
CVE-2025-52872Same product: Qnap Qts
CVE-2024-53697Same product: Qnap Qts
CVE-2025-52863Same product: Qnap Qts

References