CVE-2025-11837

CRITICAL
2026-01-02 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
CVE Published
Jan 02, 2026 - 16:15 nvd
CRITICAL 9.8

Description

An improper control of generation of code vulnerability has been reported to affect Malware Remover. The remote attackers can then exploit the vulnerability to bypass protection mechanism. We have already fixed the vulnerability in the following version: Malware Remover 6.6.8.20251023 and later

Analysis

QNAP Malware Remover before 6.6.8.20251023 has a code generation vulnerability that allows remote attackers to bypass the protection mechanism. An ironic vulnerability in a security tool that is supposed to protect QNAP NAS devices.

Technical Context

The malware removal tool itself contains a code injection flaw (CWE-94) that allows remote attackers to bypass its protection mechanism. This effectively turns a defensive tool into an attack vector. NAS devices are high-value targets containing user data and often running 24/7 with network exposure.

Affected Products

QNAP Malware Remover before 6.6.8.20251023

Remediation

Update to Malware Remover 6.6.8.20251023 or later via QNAP App Center. Restrict NAS access from the internet. Enable QNAP Security Counselor for additional monitoring.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +49
POC: 0

Share

CVE-2025-11837 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy