{"api_version":"1","generated_at":"2026-04-23T11:34:10+00:00","cve":"CVE-2020-2501","urls":{"html":"https://cve.report/CVE-2020-2501","api":"https://cve.report/api/cve/CVE-2020-2501.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-2501","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-2501"},"summary":{"title":"CVE-2020-2501","description":"A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS)","state":"PUBLIC","assigner":"security@qnap.com","published_at":"2021-02-17 04:15:00","updated_at":"2021-02-22 19:28:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-21-07","name":"https://www.qnap.com/en/security-advisory/qsa-21-07","refsource":"MISC","tags":["Vendor Advisory"],"title":"Stack Buffer Overflow in Surveillance Station - Security Advisory | QNAP","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-2501","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-2501","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"An independent security researcher reported this vulnerability to SSD Secure Disclosure","lang":""}],"nvd_cpes":[{"cve_year":"2020","cve_id":"2501","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"qnap","cpe5":"nas","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"2501","vulnerable":"0","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"qnap","cpe5":"nas","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"2501","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qnap","cpe5":"surveillance_station","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"2501","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"qnap","cpe5":"surveillance_station","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@qnap.com","DATE_PUBLIC":"2021-02-17T00:29:00.000Z","ID":"CVE-2020-2501","STATE":"PUBLIC","TITLE":"Stack Buffer Overflow in Surveillance Station"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Surveillance Station","version":{"version_data":[{"platform":"ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS)","version_affected":"<","version_value":"5.1.5.4.3"},{"platform":"ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS) .","version_affected":"<","version_value":"5.1.5.3.3"}]}}]},"vendor_name":"QNAP Systems Inc."}]}},"credit":[{"lang":"eng","value":"An independent security researcher reported this vulnerability to SSD Secure Disclosure"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS)"}]},"generator":{"engine":"Vulnogram 0.0.9"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-121 Stack-based Buffer Overflow"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://www.qnap.com/en/security-advisory/qsa-21-07","name":"https://www.qnap.com/en/security-advisory/qsa-21-07"}]},"solution":[{"lang":"eng","value":"QNAP have already fixed this vulnerability in the following versions:\n\nSurveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS)\nSurveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS)"}],"source":{"advisory":"QSA-21-07","discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2021-02-17 04:15:00","lastModifiedDate":"2021-02-22 19:28:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:qnap:surveillance_station:*:*:*:*:*:*:*:*","versionEndExcluding":"5.1.5.3.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:qnap:surveillance_station:*:*:*:*:*:*:*:*","versionStartIncluding":"5.1.5.4.0","versionEndExcluding":"5.1.5.4.3","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:qnap:nas:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"2501","Ordinal":"162059","Title":"CVE-2020-2501","CVE":"CVE-2020-2501","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"2501","Ordinal":"1","NoteData":"A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS)","Type":"Description","Title":null},{"CveYear":"2020","CveId":"2501","Ordinal":"2","NoteData":"2021-02-16","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"2501","Ordinal":"3","NoteData":"2021-02-16","Type":"Other","Title":"Modified"}]}}}