VulnerabilitiesCRITICAL

Synology Vulnerability - Remote Attackers Can Execute Commands

CSCyber Security News
CVE-2026-32746SynologyDiskStation Managerbuffer overflow
🎯

Basically, a flaw in Synology's software lets hackers run commands on your device without permission.

Quick Summary

A severe vulnerability in Synology's DiskStation Manager allows remote attackers to execute arbitrary commands. This affects many NAS systems used for enterprise data management. Immediate patching is crucial to protect sensitive data from unauthorized access.

The Flaw

A critical security advisory has been issued regarding a severe vulnerability in Synology's DiskStation Manager (DSM). This flaw, tracked as CVE-2026-32746, allows unauthenticated remote attackers to execute arbitrary commands on affected systems. The vulnerability has a near-maximum CVSSv3 base score of 9.8, categorizing it as a critical threat. The root cause lies within the telnetd daemon of the GNU Inetutils package, specifically affecting versions up to 2.7. This issue is classified as a classic buffer overflow (CWE-120).

During an active network session, the LINEMODE SLC (Set Local Characters) suboption handler improperly processes inputs. This happens because the add_slc function fails to check if the buffer is full. As a result, this oversight leads to a dangerous out-of-bounds write, allowing attackers to bypass authentication and execute malicious commands directly on the host system.

What's at Risk

NAS devices like Synology's are prime targets for cybercriminals, especially ransomware operators and data extortion groups. These systems often store sensitive corporate data and critical backups. An unauthenticated compromise could enable attackers to deploy ransomware, exfiltrate confidential files, or establish persistent backdoors before security teams can react. The potential for widespread damage is significant, making this vulnerability a serious concern for organizations relying on Synology devices for data management.

Patch Status

Synology has confirmed that multiple versions of DSM and DSMUC are critically impacted by this vulnerability. Administrators running DSM 7.3 must upgrade to version 7.3.2-86009-3 or newer. For those using DSM 7.2.2, the upgrade to version 7.2.2-72806-8 or later is necessary. Systems on DSM 7.2.1 need to upgrade to 7.2.1-69057-11 or above. Synology is actively developing a critical security patch for DSMUC 3.1. Meanwhile, other enterprise products, such as BeeStation OS 1.4, SRM 1.3, and VS600HD 1.2, are unaffected by this specific vulnerability.

Immediate Actions

For administrators managing systems pending a patch, Synology recommends applying immediate temporary mitigations. Since the vulnerability specifically requires access to the Telnet protocol, turning off the Telnet service can neutralize the risk of remote exploitation. To secure devices, navigate to the Control Panel, access Terminal settings, uncheck the “Enable Telnet service” option, and click Apply. Disabling Telnet aligns with modern cybersecurity best practices, as it transmits data in plaintext and is considered outdated.

🔒 Pro insight: Analysis pending for this article.

Original article from

Cyber Security News · Abinaya

Read Full Article

Related Pings

CRITICALVulnerabilities

Cisco Secure Firewall - Critical Remote Code Execution Flaw

Cisco has revealed a critical vulnerability in its Secure Firewall. This flaw allows remote attackers to execute code as root, posing serious risks. Immediate patching is essential to protect affected systems.

Cyber Security News·
HIGHVulnerabilities

Coruna Exploit Kit - Updated Version of Triangulation Exploit

Kaspersky experts have uncovered the Coruna exploit kit targeting iPhones. This sophisticated kit uses updated exploits from Operation Triangulation, posing a serious risk to users. Stay informed and protect your device from potential breaches.

Kaspersky Securelist·
HIGHVulnerabilities

Vulnerabilities in Segmented OT - Insights from HD Moore

HD Moore warns about vulnerabilities in segmented OT environments. Many organizations are unaware of these risks, which could lead to serious breaches. It's crucial to adopt better security measures to protect essential operations.

SC Media·
CRITICALVulnerabilities

Citrix NetScaler - Critical Vulnerability Exposed

A critical vulnerability in Citrix NetScaler devices has been identified, allowing attackers to leak sensitive data. Immediate patching is crucial to mitigate risks. Organizations must take action now to secure their systems and protect sensitive information.

CSO Online·
HIGHVulnerabilities

PolyShell Vulnerability - Attacks Target Magento Stores

A critical vulnerability in Magento is being exploited, affecting over half of vulnerable stores. This flaw allows hackers to execute remote code, risking sensitive data. Store owners must act quickly to secure their platforms.

BleepingComputer·
MEDIUMVulnerabilities

Apple Patches Vulnerabilities Across All Operating Systems

Apple has patched 85 vulnerabilities across its operating systems. While none are currently exploited, users should update their devices to enhance security. Stay safe and informed!

SANS ISC Full Text·