CVE-2025-52863
Published: 02 January 2026
Description
A buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes. We have already fixed the vulnerability…
more
in the following versions: QTS 5.2.7.3256 build 20250913 and later QuTS hero h5.2.7.3256 build 20250913 and later QuTS hero h5.3.0.3192 build 20250716 and later
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the buffer overflow vulnerability by requiring timely patching to the fixed QNAP OS versions, eliminating the root cause.
Provides memory protections such as ASLR, stack canaries, and DEP to prevent successful buffer overflow exploitation leading to memory modification or process crashes.
Enforces input validation and bounds checking in system services to block the malformed inputs that trigger the buffer overflow.
Security SummaryAI
CVE-2025-52863 is a buffer overflow vulnerability (CWE-120) affecting several versions of QNAP operating systems, including QTS and QuTS hero. Published on 2026-01-02, it carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), indicating high severity due to its potential for integrity and availability impacts without requiring user interaction.
A remote attacker who has gained a user account on an affected system can exploit the vulnerability over the network with low complexity. Successful exploitation allows the attacker to modify memory or crash processes, enabling denial-of-service conditions or unauthorized data manipulation.
QNAP has fixed the vulnerability in QTS 5.2.7.3256 build 20250913 and later, QuTS hero h5.2.7.3256 build 20250913 and later, and QuTS hero h5.3.0.3192 build 20250716 and later. Additional details are available in the vendor's security advisory at https://www.qnap.com/en/security-advisory/qsa-25-50.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote buffer overflow with low privileges enables service exploitation (T1210), process crashes for endpoint DoS via application exploitation (T1499.004), and memory modification for runtime data manipulation (T1565.003).