Cyber Posture

CVE-2024-50390

Critical

Published: 07 March 2025

Published
07 March 2025
Modified
24 September 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0060 69.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2024-50390 is a command injection vulnerability (CWE-78, CWE-1188) affecting QHora devices from QNAP. The flaw exists in the QuRouter firmware, enabling remote attackers to execute arbitrary commands if exploited. It has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low attack complexity, and lack of required privileges or user interaction.

Remote, unauthenticated attackers can exploit this vulnerability over the network without privileges or user involvement. Successful exploitation grants attackers the ability to execute arbitrary commands on the affected device, potentially leading to full system compromise with high impacts on confidentiality, integrity, and availability.

QNAP has addressed the vulnerability in QuRouter firmware version 2.4.5.032 and later. Security practitioners should update affected QHora devices to these patched versions immediately. Additional details are available in the vendor's advisory at https://www.qnap.com/en/security-advisory/qsa-25-01.

Details

CWE(s)
CWE-78CWE-1188

Affected Products

qnap
qurouter
2.4.0.190, 2.4.1.172, 2.4.1.634, 2.4.2.317, 2.4.2.538

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Remote unauthenticated command injection in public-facing QuRouter firmware directly maps to T1190 for exploitation of the exposed application and T1059.004 for arbitrary Unix shell command execution on the Linux-based device.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References