- Description
- A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuRouter 2.4.6.028 and later
- Source
- security@qnapsecurity.com.tw
- NVD status
- Analyzed
- Products
- qurouter
CVSS 4.0
- Type
- Secondary
- Base score
- 2.4
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:P/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- LOW
CVSS 3.1
- Type
- Primary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
- security@qnapsecurity.com.tw
- CWE-78
- Hype score
- Not currently trending
[ZDI-25-871|CVE-2024-13087] (Pwn2Own) QNAP QHora-322 miro_webserver_lib_RunExecBash Command Injection Remote Code Execution Vulnerability (CVSS 7.1; Credit: nella17 (@nella17tw), working with DEVCORE Internship Program, and DEVCORE Research Team) https://t.co/nRnawpJC3R
@TheZDIBugs
26 Aug 2025
982 Impressions
0 Retweets
9 Likes
1 Bookmark
0 Replies
0 Quotes
CVE-2024-13087 A command injection vulnerability has been reported to affect QHora. If an attacker gains local network access who have also gained an administrator account, they can… https://t.co/gH1rdgG5Fn
@CVEnew
6 Jun 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qnap:qurouter:2.4.0.190:build_20240522:*:*:*:*:*:*",
"matchCriteriaId": "42432B47-A274-4AC7-9E02-0D2D257A6FC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qurouter:2.4.1.172:build_20240606:*:*:*:*:*:*",
"matchCriteriaId": "77451C56-4576-4CCC-B7FD-7C874F22C3CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qurouter:2.4.1.634:build_20240710:*:*:*:*:*:*",
"matchCriteriaId": "18080300-EC8D-4F8E-926E-25D0119870AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qurouter:2.4.2.317:build_20240903:*:*:*:*:*:*",
"matchCriteriaId": "8B8B0134-D750-4258-A0A1-CDBD90728B01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qurouter:2.4.2.538:build_20240923:*:*:*:*:*:*",
"matchCriteriaId": "128C912D-D659-40A7-A0C1-185552C99CDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qurouter:2.4.3.103:build_20241011:*:*:*:*:*:*",
"matchCriteriaId": "95B7AAFE-A97C-4A81-AA34-D7548CFF4855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qurouter:2.4.4.106:build_20241017:*:*:*:*:*:*",
"matchCriteriaId": "38F814E5-382C-4765-93DD-4A17C5BC1820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qurouter:2.4.5.032:build_20241029:*:*:*:*:*:*",
"matchCriteriaId": "E4700EE7-EE4A-44C6-A907-E38DC9E906B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qurouter:2.4.6.028:build_20250207:*:*:*:*:*:*",
"matchCriteriaId": "10C4DB32-20E2-4672-BCD6-25F91722561A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]