A path traversal vulnerability has been reported to affect QuFirewall. If exploited, the vulnerability could allow authenticated administrators to read the contents of unexpected files and expose sensitive data via a network.
We have already fixed the vulnerability in the following version:
QuFirewall 2.4.1 ( 2024/02/01 ) and later
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-24-17 |       | 
History
                    Wed, 24 Sep 2025 20:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Qnap Qnap qufirewall | |
| CPEs | cpe:2.3:a:qnap:qufirewall:*:*:*:*:*:*:*:* | |
| Vendors & Products | Qnap Qnap qufirewall | 
Mon, 12 Aug 2024 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | ||
| Vendors & Products | Qnap Systems Inc Qnap Systems Inc qufirewall | |
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: qnap
Published: 2024-04-26T15:01:31.313Z
Updated: 2024-08-12T19:34:13.709Z
Reserved: 2023-08-28T09:45:52.367Z
Link: CVE-2023-41291
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T18:54:05.184Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-04-26T15:15:46.680
Modified: 2025-09-24T20:33:30.087
Link: CVE-2023-41291
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow