CVE-2025-53405
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-02

Last updated on: 2026-01-05

Assigner: QNAP Systems, Inc.

Description
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following versions: QTS 5.2.7.3256 build 20250913 and later QuTS hero h5.2.7.3256 build 20250913 and later QuTS hero h5.3.1.3250 build 20250912 and later
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-02
Last Modified
2026-01-05
Generated
2026-05-07
AI Q&A
2026-01-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 34 associated CPEs
Vendor Product Version / Range
qnap quts_hero h5.2.0.2737
qnap quts_hero h5.2.0.2782
qnap quts_hero h5.2.0.2789
qnap quts_hero h5.2.0.2802
qnap quts_hero h5.2.0.2823
qnap quts_hero h5.2.0.2851
qnap quts_hero h5.2.0.2860
qnap quts_hero h5.2.1.2929
qnap quts_hero h5.2.1.2940
qnap quts_hero h5.2.2.2952
qnap quts_hero h5.2.3.3006
qnap quts_hero h5.2.4.3070
qnap quts_hero h5.2.4.3079
qnap quts_hero h5.2.5.3138
qnap quts_hero h5.2.6.3195
qnap quts_hero h5.3.0.3115
qnap quts_hero h5.3.0.3145
qnap quts_hero h5.3.0.3192
qnap qts 5.2.0.2737
qnap qts 5.2.0.2744
qnap qts 5.2.0.2782
qnap qts 5.2.0.2802
qnap qts 5.2.0.2823
qnap qts 5.2.0.2851
qnap qts 5.2.0.2860
qnap qts 5.2.1.2930
qnap qts 5.2.2.2950
qnap qts 5.2.3.3006
qnap qts 5.2.4.3070
qnap qts 5.2.4.3079
qnap qts 5.2.4.3092
qnap qts 5.2.5.3145
qnap qts 5.2.6.3195
qnap qts 5.2.6.3229
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a NULL pointer dereference issue affecting several QNAP operating system versions. It allows a remote attacker who already has an administrator account to exploit the flaw and cause a denial-of-service (DoS) attack, potentially disrupting the normal operation of the system.


How can this vulnerability impact me? :

If exploited by a remote attacker with administrator privileges, this vulnerability can cause a denial-of-service (DoS) attack, which may result in system crashes or unavailability, impacting the reliability and availability of the affected QNAP device.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update your QNAP operating system to the fixed versions: QTS 5.2.7.3256 build 20250913 or later, QuTS hero h5.2.7.3256 build 20250913 or later, or QuTS hero h5.3.1.3250 build 20250912 or later. Additionally, restrict administrator account access to trusted users only to prevent remote attackers from exploiting this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart