cve/2024/CVE-2024-38641.md
2025-09-29 21:09:30 +02:00

23 lines
1.2 KiB
Markdown

### [CVE-2024-38641](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38641)
![](https://img.shields.io/static/v1?label=Product&message=QTS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=QuTS%20hero&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=5.1.x%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=h5.1.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=h5.1.x%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78&color=brightgreen)
### Description
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow local network users to execute commands via unspecified vectors.We have already fixed the vulnerability in the following versions:QTS 5.1.8.2823 build 20240712 and laterQuTS hero h5.1.8.2823 build 20240712 and later
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds