A command injection vulnerability has been reported to affect QuNetSwitch. If a remote attacker gains a user account, they can then exploit the vulnerability to execute arbitrary commands.
We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.5.0906 and later
We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.5.0906 and later
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-26-11 |
|
History
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability has been reported to affect QuNetSwitch. If a remote attacker gains a user account, they can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later | |
| Title | QuNetSwitch | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2026-03-20T16:21:19.890Z
Reserved: 2026-01-13T07:49:08.784Z
Link: CVE-2026-22901
No data.
Status : Received
Published: 2026-03-20T17:16:44.627
Modified: 2026-03-20T17:16:44.627
Link: CVE-2026-22901
No data.
OpenCVE Enrichment
No data.
Weaknesses