This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.qnap.com/zh-tw/security-advisory/nas-201911-25 | Vendor Advisory |
https://www.qnap.com/zh-tw/security-advisory/nas-201911-25 | Vendor Advisory |
http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
06 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.qnap.com/zh-tw/security-advisory/nas-201911-25 - Vendor Advisory | |
References | () http://packetstormsecurity.com/files/157857/QNAP-QTS-And-Photo-Station-6.0.3-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-12-05 17:15
Updated : 2025-02-13 14:15
NVD link : CVE-2019-7194
Mitre link : CVE-2019-7194
JSON object : View
Products Affected
qnap
- photo_station
- qts
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')