Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
file_station Vendor: qnap

About This Product

file_station is a software product offered by qnap. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 48 known vulnerabilities affecting qnap file_station. This includes 1 critical-severity issue and 14 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2025 to 2026, indicating a recent active security attention. 33 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2024-48864 2025-03-07 2025-09-19 9.1 - -
CVE-2025-22486 2025-06-06 2025-06-18 8.8 - -
CVE-2025-22490 2025-06-06 2025-06-18 7.5 - -
CVE-2025-29871 2025-06-06 2025-06-18 5.5 - -
CVE-2025-29872 2025-06-06 2025-06-18 7.5 - -
CVE-2025-29873 2025-06-06 2025-06-18 7.5 - -
CVE-2025-29876 2025-06-06 2025-06-18 7.5 - -
CVE-2025-29877 2025-06-06 2025-06-18 7.5 - -
CVE-2025-29883 2025-06-06 2025-06-18 8.8 - -
CVE-2025-29884 2025-06-06 2025-06-18 8.8 - -
CVE-2025-29885 2025-06-06 2025-06-18 8.8 - -
CVE-2025-30279 2025-06-06 2025-09-17 8.8 - -
CVE-2025-33031 2025-06-06 2025-09-17 8.8 - -
CVE-2025-33035 2025-06-06 2025-09-17 6.5 - -
CVE-2025-47206 2025-08-18 2025-09-12 8.1 - -
CVE-2025-29901 2025-08-26 2025-09-15 6.5 - -
CVE-2025-29874 2025-08-29 2025-09-18 6.5 - -
CVE-2025-29875 2025-08-29 2025-09-18 6.5 - -
CVE-2025-29878 2025-08-29 2025-09-18 6.5 - -
CVE-2025-29879 2025-08-29 2025-09-18 6.5 - -
CVE-2025-29886 2025-08-29 2025-09-18 6.5 - -
CVE-2025-29888 2025-08-29 2025-09-19 6.5 - -
CVE-2025-29889 2025-08-29 2025-09-19 6.5 - -
CVE-2025-29890 2025-08-29 2025-09-19 6.5 - -
CVE-2025-29899 2025-08-29 2025-09-19 6.5 - -
CVE-2025-29900 2025-08-29 2025-09-19 6.5 - -
CVE-2025-47207 2025-11-07 2025-11-14 6.5 - -
CVE-2025-52865 2025-11-07 2025-11-14 6.5 - -
CVE-2025-53408 2025-11-07 2025-11-14 6.5 - -
CVE-2025-53409 2025-11-07 2025-11-14 6.5 - -
CVE-2025-53410 2025-11-07 2025-11-14 6.5 - -
CVE-2025-53411 2025-11-07 2025-11-14 4.9 - -
CVE-2025-53412 2025-11-07 2025-11-14 6.5 - -
CVE-2025-53413 2025-11-07 2025-11-14 6.5 - -
CVE-2025-57706 2025-11-07 2025-11-14 5.4 - -
CVE-2025-54155 2026-02-11 2026-02-12 4.9 - -
CVE-2025-54161 2026-02-11 2026-02-12 4.9 - -
CVE-2025-54162 2026-02-11 2026-02-12 4.9 - -
CVE-2025-54163 2026-02-11 2026-02-12 4.9 - -
CVE-2025-54169 2026-02-11 2026-02-12 6.5 - -
CVE-2025-57707 2026-02-11 2026-02-12 8.8 - -
CVE-2025-57713 2026-02-11 2026-02-12 7.5 - -
CVE-2025-62853 2026-02-11 2026-02-12 6.5 - -
CVE-2025-62854 2026-02-11 2026-02-12 6.5 - -
CVE-2025-62855 2026-02-11 2026-02-12 4.4 - -
CVE-2025-62856 2026-02-11 2026-02-12 4.4 - -
CVE-2025-66278 2026-02-11 2026-02-12 6.5 - -
CVE-2026-22894 2026-02-11 2026-02-12 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for qnap file_station by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.