TL;DR

A critical vulnerability in QNAP TS-453E's Hyper Data Protector Plugin enables remote code execution by exploiting SQL injection and bypassing authentication.

What happened

SQL Injection leading to RCE via query_original_file_size function Authentication mechanism can be bypassed

Why it matters for ops

Risk of unauthorized access and data theft Potential for service disruption

Mitigation

  • Apply vendor-provided patches immediately
  • Implement strict access controls and monitoring

Action items

  • Update to the latest firmware version
  • Conduct a security audit of network-accessible devices

Detection IOCs

  • SQL error logs indicating injection attempts
  • Unusual network activity from affected devices

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-202/