QNAP patches multible security vulnerabilities in legacy VioStor NVR systems
Take action: If you have QNAP Legacy VioStor NVR systems, first make sure they are isolated from the internet and accessible only from trusted networks or VPN. Then plan a quick update update to QVR 5.1.6 build 20250621 or later. And set up regular firmware update schedules to stay protected against future security flaws.
Learn More
QNAP Systems has patched security vulnerabilities affecting QVR firmware in legacy VioStor Network Video Recorder (NVR) systems.
Vulnerabilities summary
- CVE-2025-52856 (CVSS score N/A): Authentication bypass vulnerability that enables remote attackers to compromise system security without proper credentials. It allows attackers to potentially gain access to sensitive surveillance data and system controls through remote authentication bypass.
- CVE-2025-52861 (CVSS score N/A): A path traversal vulnerability that becomes exploitable once an attacker gains administrator-level access. Through this flaw, malicious actors can read unexpected files and access sensitive system data beyond their intended permissions. While this vulnerability requires prior administrative access, it significantly amplifies the potential damage from successful attacks.
Legacy VioStor NVR systems running QVR 5.1.x firmware are vulnerable to both security flaws. The impact scope specifically targets older surveillance infrastructure that organizations may still be operating in production environments.
QNAP has released updated firmware that patches both vulnerabilities. Legacy VioStor NVR systems running QVR 5.1.x can upgrade to QVR 5.1.6 build 20250621 or later versions to eliminate these security risks.
QNAP strongly recommends that users establish regular update schedules to ensure their systems receive the latest security patches.