CVE-2023-41289
QcalAgent
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An OS command injection vulnerability has been reported to affect QcalAgent. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following version:
QcalAgent 1.1.8 and later
Se ha informado que una vulnerabilidad de inyección de comandos del sistema operativo afecta a QcalAgent. Si se explota, la vulnerabilidad podría permitir a los usuarios autenticados ejecutar comandos a través de una red. Ya hemos solucionado la vulnerabilidad en la siguiente versión: QcalAgent 1.1.8 y posteriores
An OS command injection vulnerability has been reported to affect QcalAgent. If exploited, the vulnerability could allow authenticated users to execute commands via a network. We have already fixed the vulnerability in the following version: QcalAgent 1.1.8 and later
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-08-28 CVE Reserved
- 2024-01-05 CVE Published
- 2025-05-26 EPSS Updated
- 2025-06-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
- CAPEC-88: OS Command Injection
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.qnap.com/en/security-advisory/qsa-23-34 | 2024-01-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Qnap Search vendor "Qnap" | Qcalagent Search vendor "Qnap" for product "Qcalagent" | >= 1.1.0 < 1.1.8 Search vendor "Qnap" for product "Qcalagent" and version " >= 1.1.0 < 1.1.8" | - |
Affected
|