A command injection vulnerability has been reported to affect QuNetSwitch. The remote attackers can then exploit the vulnerability to execute arbitrary commands.
We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.4.0415 and later
References
| Link | Resource |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-26-11 | Vendor Advisory |
Configurations
History
25 Mar 2026, 21:06
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:a:qnap:qunetswitch:*:*:*:*:*:*:*:* | |
| References | () https://www.qnap.com/en/security-advisory/qsa-26-11 - Vendor Advisory | |
| First Time |
Qnap qunetswitch
Qnap |
20 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-20 17:16
Updated : 2026-03-25 21:06
NVD link : CVE-2026-22897
Mitre link : CVE-2026-22897
CVE.ORG link : CVE-2026-22897
JSON object : View
Products Affected
qnap
- qunetswitch
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
