We have already fixed the vulnerability in the following version:
File Station 5 5.5.6.5190 and later
Metrics
Affected Vendors & Products
No advisories yet.
Solution
We have already fixed the vulnerability in the following version: File Station 5 5.5.6.5190 and later
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-26-03 |
|
Wed, 11 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: File Station 5 5.5.6.5190 and later | |
| Title | File Station 5 | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2026-02-11T16:50:14.744Z
Reserved: 2025-10-24T02:43:49.269Z
Link: CVE-2025-62856
Updated: 2026-02-11T16:50:11.795Z
Status : Awaiting Analysis
Published: 2026-02-11T13:15:58.107
Modified: 2026-02-11T15:27:26.370
Link: CVE-2025-62856
No data.
OpenCVE Enrichment
No data.