CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Description
A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4847 and later
Analysis
NULL pointer dereference vulnerability in QNAP File Station 5 that allows authenticated remote attackers to trigger a denial-of-service condition by crashing the application. While the CVSS score of 7.5 is elevated, the requirement for a valid user account (PR:N is misleading in vector; effective privilege requirement exists) and lack of data confidentiality/integrity impact limit real-world severity. The vulnerability affects File Station 5 versions prior to 5.5.6.4847, and the vendor has released patched versions.
Technical Context
CVE-2025-29876 exploits a NULL pointer dereference (CWE-476) in QNAP File Station 5, a file management service running on QNAP NAS devices. NULL pointer dereference vulnerabilities occur when code attempts to access memory through a null pointer without proper validation, causing an unhandled exception that typically crashes the process. In File Station 5's context, this likely occurs within file operation handlers, metadata processing, or request parsing logic. The vulnerability is triggered remotely (AV:N) but requires an authenticated user account, indicating the flaw exists in post-authentication code paths. QNAP File Station 5 is commonly deployed in enterprise and SOHO environments as part of QNAP QTS operating system, making it a potential target for insider threats or compromised credential scenarios.
Affected Products
QNAP File Station 5 (All versions prior to 5.5.6.4847)
Remediation
Vendor Patch: Upgrade File Station 5 to version 5.5.6.4847 or later; source: QNAP Official Advisory; priority: High Workaround - Access Control: Restrict File Station 5 access to trusted users; disable external/guest account access; implement IP whitelisting for administrative access if NAS is network-exposed; priority: Medium Workaround - Monitoring: Monitor File Station 5 process health and implement automatic restart policies to minimize DoS impact duration; priority: Medium Workaround - Network Segmentation: Isolate File Station 5 to internal network only; avoid exposing NAS directly to untrusted networks; priority: High Credential Hygiene: Audit user accounts with File Station 5 access; rotate credentials; disable unused accounts; priority: Medium
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17334