Synology patches critical remote code execution vulnerability in BeeStation OS
Take action: If you have Synology BeeStation network storage devices, check whether it has updated to BeeStation OS version 1.3.2-65648 or later. If not, force the update. And make sure to isolate it from the internet. This flaw was demonstrated at the Pwn2Own hacking competition and will probably be exploited soon
Learn More
Synology has released a security update for its BeeStation OS to address a critical-severity vulnerability discovered during the Pwn2Own 2025 competition in Ireland that allows remote unauthenticated attackers to execute arbitrary code on vulnerable BeeStation network-attached storage devices.
The flaw is tracked as CVE-2025-12686 (CVSS score 9.8), a buffer overflow. vulnerability. The vulnerability allows unauthenticated remote attackers to exploit the buffer overflow condition over the network.
All versions of Synology BeeStation OS are vulnerable, including:
- BeeStation OS 1.3
- BeeStation OS 1.2
- BeeStation OS 1.1
- BeeStation OS 1.0
Synology has patched this vulnerability in BeeStation OS version 1.3.2-65648. Users should upgrade to version 1.3.2-65648 or above immediately.
Administrators should verify that the available update has been applied on their BeeStation devices. If the update has not been automatically applied, administrators should manually install it as soon as possible and isolate their BeeStation from the internet.