### [CVE-2024-27124](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27124) ![](https://img.shields.io/static/v1?label=Product&message=QTS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=QuTS%20hero&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=QuTScloud&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.1.x%3C%205.1.3.2578%20build%2020231110%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=c5.x.x%3C%20c5.1.5.2651%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=h5.1.x%3C%20h5.1.3.2578%20build%2020231110%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78&color=brighgreen) ### Description An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.We have already fixed the vulnerability in the following versions:QTS 5.1.3.2578 build 20231110 and laterQTS 4.5.4.2627 build 20231225 and laterQuTS hero h5.1.3.2578 build 20231110 and laterQuTS hero h4.5.4.2626 build 20231225 and laterQuTScloud c5.1.5.2651 and later ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds