668
VMScore

CVE-2019-7192

Published: 05/12/2019 Updated: 22/04/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

This improper access control vulnerability allows remote malicious users to gain unauthorized access to the system. To fix these vulnerabilities, QNAP recommend updating Photo Station to their latest versions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

qnap photo_station

Exploits

QNAP QTS and Photo Station version 603 suffers from a remote command execution vulnerability ...

Github Repositories

Checker for QNAP pre-auth root RCE (CVE-2019-7192 ~ CVE-2019-7195)

QNAP Pre-Auth Root RCE (CVE-2019-7192 ~ CVE-2019-7195) Checker Usage: pip install requests /Checker_for_QNAP_RCE_cve20197192_95py /path/to/ip-porttxt Example file input: 1234 8080 2345 443 This tool takes a list of QNAP NASes' IPs and ports, and it tells if each device is vulnerable to

QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)

QNAP Pre-Auth Root RCE (CVE-2019-7192 ~ CVE-2019-7195) Exploit for now, you can read system files (/etc/shadow, ssh private key, etc) Usage: pip install -r requirementstxt # or just pip install requests python3 gundypy vulnerable_url:port Sample Output Vulnerability The vulnerabilities can be chained as a pre-auth root RCE, vi