
CVE-2019-7194
- Reference to the description:
- Description:
- This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.
- Last updated date:
- 02/13/2025
Reports

ACTIVELY EXPLOITED
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 06/09/2020
- Reference url to background
https://www.pcrisk.com/internet-threat-news/18066-ech0raix-ransomware-activity-surges
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 06/08/2022
- Reference url to background
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 06/26/2020
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 02/24/2021
- Reference url to background
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/qnap_lfi.rb
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 04/22/2022
- Reference url to background