CVE-2019-7194
- Reference to the description:
- Description:
- This external control of file name or path vulnerability allows remote attackers to access or modify system files. To fix the vulnerability, QNAP recommend updating Photo Station to their latest versions.
- Last updated date:
- 04/22/2022
Reports
ACTIVELY EXPLOITED
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 06/09/2020
- Reference url to background
https://www.pcrisk.com/internet-threat-news/18066-ech0raix-ransomware-activity-surges
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 06/08/2022
- Reference url to background
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 06/26/2020
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 02/24/2021
- Reference url to background
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/qnap_lfi.rb
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 04/22/2022
- Reference url to background