Vulnerability Note VU#444472

QNAP Signage Station and iArtist Lite contain multiple vulnerabilities

Original Release date: 25 Feb 2016 | Last revised: 25 Feb 2016


The QNAP Signage Station prior to version 2.0.1 and the accompanying iArtist Lite application contain multiple vulnerabilities.


CWE-434: Unrestricted Upload of File with Dangerous Type - CVE-2015-6022

An authenticated attacker without administrative permissions may upload a malicious file, such as a PHP script, to the QNAP Signage Station server. The attacker is then able to access the uploaded file via a predictable URL and execute the script. The script is executed on the server with administrator permissions.

CWE-290: Authentication Bypass by Spoofing - CVE-2015-6036

An unauthenticated attacker may spoof an HTTP request to the QNAP Signage Station in such a manner as to bypass authentication, allowing the attacker to perform actions such as upload files.

CWE-798: Use of Hard-coded Credentials - CVE-2015-7261
CWE-523: Unprotected Transport of Credentials

QNAP iArtist Lite contains a hard-coded FTP account and password, and uses these credentials to communicate with Signage Station. FTP transmits all data in plain text and is not secure from attackers eavesdropping on the network.

CWE-427: Uncontrolled Search Path Element - CVE-2015-7262

QNAP iArtist Lite allows a user to register a binary with the iArtist service, which will be executed with SYSTEM privileges upon next system restart.


An unauthenticated user may be able to execute commands on the server with system privileges.


Apply an update

QNAP has released Signage Station 2.0.1 and iArtist Lite 1.4.54 to address this issue. Affected users are encouraged to update as soon as possible.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
QNAPAffected23 Sep 201516 Oct 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 9.0 AV:N/AC:L/Au:S/C:C/I:C/A:C
Temporal 7.4 E:F/RL:OF/RC:C
Environmental 5.6 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND



Thanks to Mark Woods for reporting these vulnerabilities.

This document was written by Garret Wassermann.

Other Information


If you have feedback, comments, or additional information about this vulnerability, please send us email.