CVE DATABASE / CVE-2018-19949
CVE-2018-19949
QNAP NAS File Station Command Injection Vulnerability
Confirmed exploited in the wild. Added 2022-05-24.
Federal remediation due 2022-06-14.
Required action: Apply updates per vendor instructions.
Summary
If exploited, this command injection vulnerability could allow remote attackers to run arbitrary commands. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109.
CVSS 3.1 breakdown
| Base score | 9.8 (CRITICAL) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Attack vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity | HIGH |
| Availability | HIGH |
Weakness type (CWE)
Affected products
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- https://www.qnap.com/zh-tw/security-advisory/qsa-20-01
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-19949
Data: NIST NVD + CISA KEV. NVD last modified 2025-11-03. Always verify against the vendor advisory before acting.