cve/2019/CVE-2019-7195.md

27 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-7195](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7195)
![](https://img.shields.io/static/v1?label=Product&message=QNAP%20NAS%20devices%20running%20Photo%20Station&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=QTS%204.4.1%3A%20Photo%20Station%20before%20version%206.0.3%2C%20QTS%204.3.4%20-%20QTS%204.4.0%3A%20Photo%20Station%20before%20version%205.7.10%2C%20QTS%204.3.0%20-%20QTS%204.3.3%3A%20Photo%20Station%20before%20version%205.4.9%2C%20QTS%204.2.6%3A%20Photo%20Station%20before%20version%205.2.11%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=External%20Control%20of%20File%20Name%20or%20Path&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.
### POC
#### Reference
- http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/20142995/nuclei-templates
2024-05-26 14:27:05 +02:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
2025-09-29 21:09:30 +02:00
- https://github.com/cyb3r-w0lf/nuclei-template-collection
2024-05-26 14:27:05 +02:00
- https://github.com/cycraft-corp/cve-2019-7192-check
- https://github.com/lnick2023/nicenice
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/th3gundy/CVE-2019-7192_QNAP_Exploit
- https://github.com/xbl3/awesome-cve-poc_qazbnm456