EUVD-2025-17334

| CVE-2025-29876 HIGH
2025-06-06 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17334
CVE Published
Jun 06, 2025 - 16:15 nvd
HIGH 7.5

Description

A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.4847 and later

Analysis

NULL pointer dereference vulnerability in QNAP File Station 5 that allows authenticated remote attackers to trigger a denial-of-service condition by crashing the application. While the CVSS score of 7.5 is elevated, the requirement for a valid user account (PR:N is misleading in vector; effective privilege requirement exists) and lack of data confidentiality/integrity impact limit real-world severity. The vulnerability affects File Station 5 versions prior to 5.5.6.4847, and the vendor has released patched versions.

Technical Context

CVE-2025-29876 exploits a NULL pointer dereference (CWE-476) in QNAP File Station 5, a file management service running on QNAP NAS devices. NULL pointer dereference vulnerabilities occur when code attempts to access memory through a null pointer without proper validation, causing an unhandled exception that typically crashes the process. In File Station 5's context, this likely occurs within file operation handlers, metadata processing, or request parsing logic. The vulnerability is triggered remotely (AV:N) but requires an authenticated user account, indicating the flaw exists in post-authentication code paths. QNAP File Station 5 is commonly deployed in enterprise and SOHO environments as part of QNAP QTS operating system, making it a potential target for insider threats or compromised credential scenarios.

Affected Products

QNAP File Station 5 (All versions prior to 5.5.6.4847)

Remediation

Vendor Patch: Upgrade File Station 5 to version 5.5.6.4847 or later; source: QNAP Official Advisory; priority: High Workaround - Access Control: Restrict File Station 5 access to trusted users; disable external/guest account access; implement IP whitelisting for administrative access if NAS is network-exposed; priority: Medium Workaround - Monitoring: Monitor File Station 5 process health and implement automatic restart policies to minimize DoS impact duration; priority: Medium Workaround - Network Segmentation: Isolate File Station 5 to internal network only; avoid exposing NAS directly to untrusted networks; priority: High Credential Hygiene: Audit user accounts with File Station 5 access; rotate credentials; disable unused accounts; priority: Medium

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +38
POC: 0

Share

EUVD-2025-17334 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy