Cyber Posture

CVE-2025-11837

Critical

Published: 02 January 2026

Published
02 January 2026
Modified
22 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 32.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

An improper control of generation of code vulnerability has been reported to affect Malware Remover. The remote attackers can then exploit the vulnerability to bypass protection mechanism. We have already fixed the vulnerability in the following version: Malware Remover 6.6.8.20251023…

more

and later

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely patching of the improper code generation flaw in Malware Remover to the fixed version 6.6.8.20251023.

prevent

Prevents exploitation of the CWE-94 code injection vulnerability by validating all inputs used in dynamic code generation within Malware Remover.

prevent

Mitigates potential arbitrary code execution from the improper code generation by enforcing memory protections like DEP and ASLR in the affected system.

Security SummaryAI

CVE-2025-11837 is an improper control of generation of code vulnerability (CWE-94) affecting QNAP's Malware Remover software. Published on 2026-01-02, it enables remote attackers to bypass the software's protection mechanism, earning a critical CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote, unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows bypassing Malware Remover's protection mechanisms, potentially leading to high impacts on confidentiality, integrity, and availability.

QNAP has addressed the issue in Malware Remover version 6.6.8.20251023 and later releases. Additional mitigation details are available in security advisory QSA-25-47 at https://www.qnap.com/en/security-advisory/qsa-25-47.

Details

CWE(s)

Affected Products

qnap
malware remover
6.6.3 — 6.6.8.20251023

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1211 Exploitation for Stealth Stealth
Adversaries may exploit vulnerabilities to evade detection by hiding activity, suppressing logging, or operating within trusted or unmonitored components.
T1685 Disable or Modify Tools Defense Impairment
Adversaries may disable, degrade, or tamper with security tools or applications (e.
Why these techniques?

Vulnerability in public-facing Malware Remover (AV:N) enables exploitation of public-facing application (T1190), specifically for defense evasion by bypassing security tool protections (T1211, T1562.001), with critical RCE-like impacts.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References