### [CVE-2024-32763](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32763) ![](https://img.shields.io/static/v1?label=Product&message=QTS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=QuTS%20hero&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.1.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=h5.1.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122&color=brightgreen) ### Description A buffer copy without checking size of input vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to execute code via a network.We have already fixed the vulnerability in the following versions:QTS 5.1.8.2823 build 20240712 and laterQuTS hero h5.1.8.2823 build 20240712 and later ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds