Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Home/CyberSecurity News/Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret
CyberSecurity News

Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret

QNAP has patched Multiple Vulnerabilities within its License Center application, flaws that could enable attackers to access sensitive information or disrupt services on affected NAS devices. The...

Marcus Rodriguez
Marcus Rodriguez
January 5, 2026 2 Min Read
10 0

QNAP has patched Multiple Vulnerabilities within its License Center application, flaws that could enable attackers to access sensitive information or disrupt services on affected NAS devices.

The issues, tracked as CVE-2025-52871 and CVE-2025-53597, were disclosed on January 3, 2026.

QNAP rated the flaws as Moderate severity and confirmed that the issues have been resolved in the latest releases. The Vulnerabilities in QNAP systems.

While the bugs are not described as unauthenticated remote exploits, QNAP notes that an attacker would first need access to a valid account.

Which makes credential theft, weak passwords, or exposed admin portals key risk factors.

Overview of the Security Flaws

CVE-2025-52871 is an out-of-bounds read vulnerability. According to QNAP, if a remote attacker gains access to a user account, they may exploit the flaw to obtain secret data.

CVE ID Vulnerability Type Affected Product Impact
CVE-2025-52871 Out-of-bounds Read License Center 2.0.x A remote attacker with admin account can modify memory or crash processes
CVE-2025-53597 Buffer Overflow License Center 2.0.x A remote attacker with an admin account can modify memory or crash processes

Out-of-bounds read issues typically allow unintended memory disclosure, which can expose tokens, keys, or other sensitive values depending on what is stored in memory during execution.

CVE-2025-53597 is a buffer overflow vulnerability. QNAP states that if a remote attacker gains access to an administrator account.

They could exploit it to modify memory or crash processes, potentially causing instability or denial-of-service on affected systems. QNAP has fixed the vulnerabilities in License Center 2.0.36 and later.

Organizations and home users running License Center 2.0.x should update immediately, especially if the NAS is reachable from the internet or shared across many users.

Access the QTS or QuTS hero management interface and authenticate with administrator privileges. Navigate to App Center from the system menu.

In App Center, use the search function to locate License Center. Select the application and click Update. Confirm the update when prompted to complete the process. QNAP credited Coral for reporting the issues.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Resecurity Honeypot Traps Hackers in Trapped Resecurity’s

Next Post

Threat Actor Leaks NordVPN Salesforce Database Source Codes

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us