CVE-2025-47208

MEDIUM4.9/ 10.0
Share:
Published: January 2, 2026 at 03:16 PM
Modified: January 5, 2026 at 07:47 PM
Source: security@qnapsecurity.com.tw

Vulnerability Description

An allocation of resources without limits or throttling vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource. We have already fixed the vulnerability in the following versions: QTS 5.2.6.3195 build 20250715 and later QuTS hero h5.2.6.3195 build 20250715 and later

CVSS Metrics

Base Score
4.9
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: security@qnapsecurity.com.tw

AI Security Analysis

01 // Technical Summary

QNAP NAS devices are vulnerable to a resource exhaustion attack, allowing a remote attacker with user credentials to deny service to legitimate users and applications. This vulnerability stems from a lack of resource limits, enabling attackers to consume all available resources and cripple the device's functionality. Successful exploitation can lead to significant data loss and business disruption.

02 // Vulnerability Mechanism

Step 1: Account Compromise: The attacker gains access to a valid user account on the QNAP device. This could be achieved through various means, such as credential stuffing, phishing, or exploiting other vulnerabilities.

Step 2: Resource Request Flood: The attacker, using the compromised account, initiates a large number of resource requests. The nature of these requests depends on the specific resource being targeted (e.g., file creation, network connections, memory allocation).

Step 3: Resource Exhaustion: The system, lacking resource limits, processes the attacker's requests, leading to the exhaustion of the targeted resource. This could be CPU, memory, disk I/O, or network bandwidth.

Step 4: Service Degradation/DoS: As the targeted resource is depleted, legitimate users and applications are unable to access the same resource, resulting in service degradation or a complete denial of service. The QNAP device becomes unresponsive or unstable.

03 // Deep Technical Analysis

The vulnerability lies in the absence of proper resource allocation limits and throttling mechanisms within the QNAP operating system. Specifically, a function or process that handles resource requests (e.g., memory, disk I/O, network connections) fails to implement checks or constraints on the number or rate of these requests. This allows an authenticated attacker to submit a large number of requests, overwhelming the system's capacity. The root cause is likely a coding error where the system fails to account for resource consumption, leading to a denial-of-service (DoS) condition. The lack of rate limiting and resource quotas exacerbates the issue, allowing a single compromised account to monopolize system resources. The specific function or process responsible for the flawed resource allocation needs to be identified through reverse engineering or code review to pinpoint the exact location of the vulnerability.

CVE-2025-47208 - MEDIUM Severity (4.9) | Free CVE Database | 4nuxd