CVE-2023-23367

Summary

CVECVE-2023-23367
StateRESERVED
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-11-10 15:15:00 UTC
Updated2023-11-21 03:08:00 UTC
Description** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.

Risk And Classification

Problem Types: CWE-78

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Qnap Qts 5.0.0.1716 build_20210701 All All
Operating System Qnap Qts 5.0.0.1785 build_20210908 All All
Operating System Qnap Qts 5.0.0.1808 build_20211001 All All
Operating System Qnap Qts 5.0.0.1828 build_20211020 All All
Operating System Qnap Qts 5.0.0.1837 build_20211029 All All
Operating System Qnap Qts 5.0.0.1850 build_20211111 All All
Operating System Qnap Qts 5.0.0.1853 build_20211114 All All
Operating System Qnap Qts 5.0.0.1858 build_20211119 All All
Operating System Qnap Qts 5.0.0.1870 build_20211201 All All
Operating System Qnap Qts 5.0.1.2034 build_20220515 All All
Operating System Qnap Qts 5.0.1.2079 build_20220629 All All
Operating System Qnap Qts 5.0.1.2131 build_20220820 All All
Operating System Qnap Qts 5.0.1.2137 build_20220826 All All
Operating System Qnap Qts 5.0.1.2145 build_20220903 All All
Operating System Qnap Qts 5.0.1.2173 build_20221001 All All
Operating System Qnap Qts 5.0.1.2194 build_20221022 All All
Operating System Qnap Qts 5.0.1.2234 build_20221201 All All
Operating System Qnap Qts 5.0.1.2248 build_20221215 All All
Operating System Qnap Qts 5.0.1.2277 build_20230112 All All
Operating System Qnap Qts 5.0.1.2346 build_20230322 All All
Operating System Qnap Qutscloud c5.0.0.1919 build_20220119 All All
Operating System Qnap Qutscloud c5.0.1.1949 build_20220218 All All
Operating System Qnap Qutscloud c5.0.1.1998 build_20220408 All All
Operating System Qnap Qutscloud c5.0.1.2044 build_20220524 All All
Operating System Qnap Qutscloud c5.0.1.2148 build_20220905 All All
Operating System Qnap Qutscloud c5.0.1.2374 build_20230419 All All
Operating System Qnap Quts Hero h5.0.0.1772 build_20210826 All All
Operating System Qnap Quts Hero h5.0.0.1844 build_20211105 All All
Operating System Qnap Quts Hero h5.0.0.1856 build_20211117 All All
Operating System Qnap Quts Hero h5.0.0.1892 build_20211222 All All
Operating System Qnap Quts Hero h5.0.0.1900 build_20211228 All All
Operating System Qnap Quts Hero h5.0.0.1949 build_20220215 All All
Operating System Qnap Quts Hero h5.0.0.1986 build_20220324 All All
Operating System Qnap Quts Hero h5.0.0.2022 build_20220428 All All
Operating System Qnap Quts Hero h5.0.0.2069 build_20220614 All All
Operating System Qnap Quts Hero h5.0.0.2120 build_20220804 All All
Operating System Qnap Quts Hero h5.0.1.2045 build_20220526 All All
Operating System Qnap Quts Hero h5.0.1.2192 build_20221020 All All
Operating System Qnap Quts Hero h5.0.1.2248 build_20221215 All All
Operating System Qnap Quts Hero h5.0.1.2269 build_20230104 All All
Operating System Qnap Quts Hero h5.0.1.2277 build_20230112 All All
Operating System Qnap Quts Hero h5.0.1.2348 build_20230324 All All

References

ReferenceSourceLinkTags
Vulnerability in QTS, QuTS hero, and QuTScloud - Security Advisory | QNAP www.qnap.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 731065 QNAP QTS OS Command Injection Vulnerability (QSA-23-24)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report