Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in Synology DSM Risks Remote Exploitation

Critical Flaw in Synology DSM Risks Remote Exploitation

Posted on March 26, 2026 By CWS

Synology has issued an urgent security alert regarding a serious vulnerability in DiskStation Manager (DSM) that could allow remote attackers to execute unauthorized commands.

Vulnerability Details

This flaw, identified as CVE-2026-32746, is particularly concerning due to its high CVSSv3 base score of 9.8, classifying it as critical. The vulnerability originates in the telnetd daemon of the GNU Inetutils package, affecting versions up to 2.7, and is a classic buffer overflow (CWE-120).

The problem arises during an active network session when the LINEMODE SLC (Set Local Characters) suboption mishandles inputs due to inadequate buffer checks by the add_slc function. Such oversight can lead to out-of-bounds writes, enabling attackers to bypass authentication and execute commands maliciously.

Implications for NAS Systems

Synology NAS devices are prime targets for ransomware and data theft, given their role in storing sensitive information and critical backups. Remote command-execution vulnerabilities pose significant risks, potentially leading to ransomware deployment, data theft, and establishing persistent access before detection.

Synology has acknowledged the critical impact on multiple DSM and DSMUC versions. Firmware updates are available for DSM 7.3, which should be upgraded to version 7.3.2-86009-3 or newer. Users of DSM 7.2.2 and DSM 7.2.1 must update to versions 7.2.2-72806-8 and 7.2.1-69057-11, respectively. A patch for DSMUC 3.1 is still under development.

Mitigation and Best Practices

To mitigate the risk, Synology advises disabling the Telnet service, which is susceptible to exploitation. Administrators should navigate to the Control Panel, access Terminal settings, uncheck ‘Enable Telnet service,’ and click Apply. This aligns with modern cybersecurity practices, as Telnet transmits data in plaintext and is considered obsolete.

While other enterprise products like BeeStation OS 1.4, SRM 1.3, and VS600HD 1.2 are unaffected, vigilance is essential. For systems awaiting patches, immediate temporary mitigation by disabling Telnet is crucial to securing NAS devices from potential threats.

Stay informed with the latest cybersecurity news by following us on Google News, LinkedIn, and X. For further information or to share your stories, contact us today.

Cyber Security News Tags:buffer overflow, CVSS, DSM, NAS, Patch, remote attack, Security, Synology, Telnet, Vulnerability

Post navigation

Previous Post: Microsoft Entra ID Enhances MFA with New Feature
Next Post: Coruna iOS Kit Revives 2023 Exploits in New Attacks

Related Posts

HexStrike AI Connects ChatGPT, Claude, Copilot with 150+ Security Tools like Burp Suite and Nmap HexStrike AI Connects ChatGPT, Claude, Copilot with 150+ Security Tools like Burp Suite and Nmap Cyber Security News
Critical ModSecurity WAF Vulnerability Allows Denial of Service via Empty XML Tags Critical ModSecurity WAF Vulnerability Allows Denial of Service via Empty XML Tags Cyber Security News
Reddit Faces £14.47 Million Fine for Child Data Breach Reddit Faces £14.47 Million Fine for Child Data Breach Cyber Security News
Microsoft to Kill Popular Editor Browser Extensions on Edge and Chrome Microsoft to Kill Popular Editor Browser Extensions on Edge and Chrome Cyber Security News
Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used Cyber Security News
“GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload “GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Supply Chain Attack Hits Checkmarx Jenkins Plugin
  • Vidar Malware Exploits Browser Data and Crypto Wallets
  • Canvas Restores Access After Cyberattack Disruption
  • Fake OpenAI Repo Delivers Malware on Hugging Face
  • Crimenetwork Crime Hub Dismantled by German Police

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Supply Chain Attack Hits Checkmarx Jenkins Plugin
  • Vidar Malware Exploits Browser Data and Crypto Wallets
  • Canvas Restores Access After Cyberattack Disruption
  • Fake OpenAI Repo Delivers Malware on Hugging Face
  • Crimenetwork Crime Hub Dismantled by German Police

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark