Malicious agents have launched extensive investigations into Internet, in order to find Appliances running versions of it QNAP firmware, in order to exploit a remote code execution vulnerability (RCE). That said vulnerability has been fixed by QNAP in a previous version.
However as posted yesterday by his researchers Qihoo 360's Network Security Research Lab (360 Netlab), some hackers exploit a vulnerability to execute remote commands due to a defect command execution in the firmware of QNAP NAS devices.
Vulnerability could lead to remote code execution
Unauthorized hackers can exploit the vulnerability to gain authorization using the executable authLogout.cgi. This executable does not filter out special characters, so it does not clear the input and allows the mode the system to execute the command string, thus allowing command execution, which in turn allows remote code execution.
360 Netlab researchers revealed their findings to QNAP PSIRT on May 13, and on August 12 (three months later) they were informed that the company had addressed the security issue in an earlier security update and that there were still QNAP NAS devices to be updated. .
Vulnerability fixed in version 4.3.3, replacing the function used to execute the command strings.
QNAP urges its customers to update their devices
According to the researchers of 360 Netlab, the malicious agents who carry out the attacks have not fully automated the process and execute some parts of it manually.
While 360 Netlab has not yet identified the ultimate target of the attackers, it has found that they develop two identical payloads on all compromised devices. One of them is a "reverse shell" that operates on port TCP / 1234.
360 Netlab provides a list of all affected versions of QNAP firmware. QNAP storage devices have also been targeted recently by an eCh0raix Ransomware campaign launched two months ago.