{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T03:17:17.703","vulnerabilities":[{"cve":{"id":"CVE-2024-48860","sourceIdentifier":"security@qnapsecurity.com.tw","published":"2024-11-22T16:15:28.337","lastModified":"2025-09-24T19:09:57.467","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An OS command injection vulnerability has been reported to affect several product versions. If exploited, the vulnerability could allow remote attackers to execute commands.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.4.3.103 and later"},{"lang":"es","value":"Se ha informado de una vulnerabilidad de inyección de comandos en el sistema operativo que afecta a varias versiones del producto. Si se explota, la vulnerabilidad podría permitir a atacantes remotos ejecutar comandos. Ya hemos corregido la vulnerabilidad en la siguiente versión: QuRouter 2.4.3.103 y posteriores"}],"metrics":{"cvssMetricV40":[{"source":"security@qnapsecurity.com.tw","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.5,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@qnapsecurity.com.tw","type":"Secondary","description":[{"lang":"en","value":"CWE-77"},{"lang":"en","value":"CWE-78"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qurouter:2.4.0.190:build_20240522:*:*:*:*:*:*","matchCriteriaId":"42432B47-A274-4AC7-9E02-0D2D257A6FC5"},{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qurouter:2.4.1.172:build_20240606:*:*:*:*:*:*","matchCriteriaId":"77451C56-4576-4CCC-B7FD-7C874F22C3CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qurouter:2.4.1.634:build_20240710:*:*:*:*:*:*","matchCriteriaId":"18080300-EC8D-4F8E-926E-25D0119870AD"},{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qurouter:2.4.2.317:build_20240903:*:*:*:*:*:*","matchCriteriaId":"8B8B0134-D750-4258-A0A1-CDBD90728B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qurouter:2.4.2.538:build_20240923:*:*:*:*:*:*","matchCriteriaId":"128C912D-D659-40A7-A0C1-185552C99CDD"}]}]}],"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-24-44","source":"security@qnapsecurity.com.tw","tags":["Vendor Advisory"]}]}}]}