Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

File Station 5 — Vulnerabilities & Security Advisories 49

All 49 CVE vulnerabilities found in File Station 5, with AI-generated Chinese analysis, references, and POCs.

This page documents security weaknesses associated with File Station 5, a network-attached storage file management application developed by Synology Inc. It provides a comprehensive collection of identified vulnerabilities that impact the integrity, availability, or confidentiality of the software, encompassing various weakness types such as cross-site scripting, path traversal, and improper access control mechanisms. The records compiled here cover security issues reported and disclosed within a defined historical time range, ensuring that users can review both recent patches and legacy flaws that may still affect older deployments or unpatched systems. By consulting this resource, visitors can track vendor advisories to stay informed about critical updates and mitigation strategies recommended by Synology. Users may also gain a deeper understanding of specific weakness classes by analyzing how they manifest within the unique architecture of File Station 5. Additionally, the page allows for the lookup of a product’s vulnerability history, offering a chronological view of security incidents and their resolutions. This structured approach facilitates better risk assessment and compliance monitoring for system administrators and security professionals who rely on accurate, centralized data regarding known defects. The goal is to provide transparency and actionable insights without overwhelming the reader with unnecessary technical jargon or promotional content, ensuring that the focus remains strictly on factual security information and historical context relevant to maintaining a secure storage environment.

Vendor: QNAP Systems Inc.

CVE IDTitleCVSSSeverityPublished
CVE-2025-54155 File Station 5 CWE-770 6.8AIMediumAI2026-02-11
CVE-2025-54161 File Station 5 CWE-770 6.8AIMediumAI2026-02-11
CVE-2025-54162 File Station 5 CWE-22 6.5AIMediumAI2026-02-11
CVE-2025-54163 File Station 5 CWE-476 7.5AIHighAI2026-02-11
CVE-2025-54169 File Station 5 CWE-125 7.5AIHighAI2026-02-11
CVE-2025-57707 File Station 5 CWE-96 6.5AIMediumAI2026-02-11
CVE-2025-57713 File Station 5 CWE-1390 7.5AIHighAI2026-02-11
CVE-2025-62853 File Station 5 CWE-22 6.5AIMediumAI2026-02-11
CVE-2025-62854 File Station 5 CWE-400 7.5AIHighAI2026-02-11
CVE-2025-62855 File Station 5 CWE-22 5.5AIMediumAI2026-02-11
CVE-2025-62856 File Station 5 CWE-22 5.5AIMediumAI2026-02-11
CVE-2025-66278 File Station 5 CWE-22 6.5AIMediumAI2026-02-11
CVE-2026-22894 File Station 5 CWE-22 6.5AIMediumAI2026-02-11
CVE-2025-47207 File Station 5 CWE-476 7.5 -2025-11-07
CVE-2025-52865 File Station 5 CWE-476 7.5 -2025-11-07
CVE-2025-53408 File Station 5 CWE-476 7.5 -2025-11-07
CVE-2025-53409 File Station 5 CWE-770 5.0 -2025-11-07
CVE-2025-53410 File Station 5 CWE-770 5.0 -2025-11-07
CVE-2025-53411 File Station 5 CWE-770 6.8 -2025-11-07
CVE-2025-53412 File Station 5 CWE-476 7.5 -2025-11-07
CVE-2025-53413 File Station 5 CWE-770 5.0 -2025-11-07
CVE-2025-57706 File Station 5 CWE-79 5.4 -2025-11-07
CVE-2025-29900 File Station 5 CWE-770 5.0 -2025-08-29
CVE-2025-29899 File Station 5 CWE-770 5.0 -2025-08-29
CVE-2025-29890 File Station 5 CWE-770 5.0 -2025-08-29
CVE-2025-29889 File Station 5 CWE-476 7.5 -2025-08-29
CVE-2025-29888 File Station 5 CWE-476 7.5 -2025-08-29
CVE-2025-29886 File Station 5 CWE-476 7.5 -2025-08-29
CVE-2025-29879 File Station 5 CWE-476 7.5 -2025-08-29
CVE-2025-29878 File Station 5 CWE-476 7.5 -2025-08-29

All 49 known CVE vulnerabilities affecting File Station 5 with full Chinese analysis, references, and POCs where available.