FreshRSS

🔒
❌ À propos de FreshRSS
Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
À partir d’avant-hierFlux principal

6 Things You Can Do With Your NAS Other Than Backup Storage

23 juin 2021 à 16:00

Cool Things You Can Do With Your NAS other Than Backup Storage

The main motivation for most users who purchase a new network-attached (NAS) storage device is often a means to create an alternative to Cloud services, backup several devices safely and really just to make sure that there is a mean to keep their data safe and sound, but also within reach when needed. The majority of NAS brands perform this function well and if you are looking for a NAS just to do these functions, then you will always be successful, regardless of the unit you choose. However, there is actually a huge number of things that a NAS can do and with the evolution of modern NAS hardware from brands like Synology and QNAP, most users do not even realise the cool things they can do with their system to maximize their investment or simply to have a little fun. So today I want to go through some of the best things you can do with a NAS drive that are more than just using it as a simple backup storage system. Let’s go!

Important – All of the things below that I recommend for your NAS drive are available on the majority of NAS systems from Synology, QNAP, Asustor, WD My Cloud or Terramaster. However, the extent to which they can be done and the overall performance that you will achieve will be based on the power of the NAS drive that you own and the number of simultaneous processes that you run. So if you are already using more than 90% of the existing hardware to run a large-scale simultaneous backup operation, that will not leave a vast amount of resources to run anything else. So just bear in mind that the extent to which the below fun things you can do with your NAS also depend on the hardware resources at your disposal.

Use Your NAS to Build Your Own NetFlix

Probably the most well-known thing about NAS that is popular for home users is that you can use the system to watch media over DLNA in your home. However, a lot of users do not realise the extent to which you can enjoy movies and box sets on your NAS. It’s one thing to have a big pile of files that you can access in a breadcrumb file/folder level over the network. It is another thing entirely to create a complete slick and well-designed user interface, with all of your decades of TV shows and movies displayed in a form similar to the likes of Netflix and Amazon Prime Video. However, this is exactly what you can do if you take advantage of PLEX media server or Synology Video Station. These applications allow you to index (ie scan and catalogue) your existing collections of media, then they search online databases for box art, reviews, cast lists, trailers and more, which then allows you to automatically present this information on your smart TV, tablet, console or phone in beautifully designed and intuitive software menus. Indeed, Plex Media Server and Synology Video Station are available on the majority of everyday internet-connected media devices and both of these applications are free or included in the cost of your NAS. Find out more about Plex media server on your NAS using the media you own, as well as connecting online multimedia services, in the video below.

It is also worth highlighting that your own personal Netflix on your NAS experience is not limited to just been connected to by you, as you can allow family and friends to access your NAS with this sleek and intuitive user interface anywhere on the network or remotely via the internet too.

Use Your NAS to Build Your Own Google Drive Shared Cloud

Most users think of a NAS as a giant hard drive that they connect to their devices remotely in order to back up their data. In most cases, a home user who purchased the NAS did so to move away from Cloud services like Dropbox and Google. However, some users are still blissfully unaware that you can use a NAS to host your very own version of Dropbox or Google drive for hundreds or thousands of users if you choose. Taking advantage of the file and space management services of a NAS in conjunction with online browser-based access and you can present areas of storage on your NAS to users with their very own login information, area of space that can be changed on the fly, controlled file types/sizes and the whole thing presented as an easy web browser-based cloud platform. Although this is available on the majority of NAS brands using their own software and client, Synology Drive provides this in the best way and is by far the most similar in design, ability and execution to DropBox and Google Drive. Find out more about Synology drive below:

The number of simultaneous or concurrent user that you can provide individual private cloud space to is only really limited by the NAS and the total available capacity, but even very very modest NAS systems at a few £100 can support hundreds of users at once. 

Use Your NAS to Setup a Enterprise-Grade Surveillance System at Home or Work

Most people who are even vaguely aware of modern NAS will hear the word surveillance thrown around quite a lot. They sort of know that they can have some cameras about the place that can send recordings to their NAS drive, but above and beyond that, they don’t really know much about it, don’t know how easy it is and ultimately decide not to really look into it. However in the most modern examples of network-attached storage, not only do the big brands all include surveillance software that is genuinely on par with the best and most premium grade NVR and CCTV software (Milestone and Axis Nvr), but also the cost of IP cameras that connect to your home or office network cost way, WAY less than you think. Even the compatible range of cameras that you can use that are supported arrive in the thousands of models and as long as the camera supports ONVIF, it will work. Many affordable Wi-Fi cameras and even solar-powered cameras that connect to your NAS over the network internet can be purchased for as little as £30 and once connected to the NAS surveillance software, with its remote access architecture and easy-to-use graphical user interface, you can set up a surveillance and protective security system in your home/business for very little money than you already spent on the NAS. Here is how Synology Surveillance station and QNAP’s QVR Pro software compare. Just remember that both of these programs are included with the cost of your NAS, which brings any expense on your NVR setup even lower:

The maximum number of cameras you can run at any one time, the total picture quality and the size of recordings generated will depend on the power and size of your NAS, but even affordable one day NAS solutions can be quite effective as a surveillance network video recorder.

Use Your NAS to Create a Virtual Machine for Work, Rest and Play

The use of virtual machines (VMs) used to be something that was only deployed and understood by big business. However, in 2021/2022, they are now being used to a highly productive and effective degree by even small home users as remote connecting systems. In essence, a virtual machine is a digital image of a physical computer. It needs to live within the confines of another computer, in this case a NAS, but its hardware specifications are represented as digital equivalents and this virtual version of a computer can be accessed remotely via the network or internet. Many users who purchased network-attached storage devices simply for backups will one day find out that they are using a mere fraction of the total available hardware inside their NAS. A great way to take advantage of this hardware available and put it to better use while your NAS is on 24×7 is to create a virtual machine within the NAS and then use it for business use, for personal centralised computer use or even or numerous fun tasks. These can include testing an operating system that you’ve never used before, running a legacy operating system like Windows 98 or XP in order to play old games or software, or even create light Linux VMs to deploy bespoke custom applications and retro games via emulation software like Retroarch and LaunchBox. Virtual machines are now painfully easy to deploy and all of the current modern NAS brands include their own first past the VM software. Take a look below at how Synology and QNAP compare in virtual machine support on their mass.

A particular stand out of this is QNAP with three separate virtual machine tools (Virtualization Station, Linux Station and Container Station) and within each of them, the ability to simply download numerous virtual machine images (from within the software GUI) for near-instant deployment in around 2 clicks of the mouse. Taking care of the entire setup and allowing you to just start having fun or doing business with your new virtual machine.

Use Your NAS to Farm and Plot Chia Coin Cryptocurrency

Although many people would agree that the latest change in the cryptocurrency market towards more environmentally friendly methods is a good thing, there are plenty who would argue that the Chia cryptocurrency wave that is massively affecting the storage market right now is pretty dreadful. The appeal of taking advantage of high-performance SSD and high durability hard drives in order to plot and farm potential Chia coin is constantly growing in popularity and for those users that want to jump on this potentially lucrative bandwagon, many are not even aware that they already have the hardware to do so. As long as you have a NAS that supports multiple hard drives in a RAID storage array and allow the installation of containers, then your NAS can be used in the Chia crypto processes. Executing it is by no means straightforward and although it is easier on some NAS browns than others, it still does require you to have a decent amount of available storage space and a fairly decent array of default resources in the NAS at your disposal. Nevertheless, once you overcome over the initial steeper learning curve, afterwards your NAS is largely self-governed and you don’t have to interfere with the system in the running of Chai based processes. Take a look below at how to set up your chia machine on a QNAP NAS (QNAP UK have a great video on this):

It is also worth highlighting that QNAP even has a third-party app that you can install on your system to marginally make this process even easier. It is available in the unofficial app center, but worth a look:

Use your NAS for Medical Science and Human Innovation

Sometimes users can tend to feel a little guilty that the NAS they use simply for storage and backups is left on for days, weeks or months at a time. There is of course the matter of when your electricity bill arrives, which is arguably quite a small some thanks to modern efficient design, but there is nevertheless the feeling of the environmental impact and the fact that you are leaving a system to run idle between the sporadic times that you need access to its resources. NAS drives are not alone in this (though there is arguably more wasteful resource computer hardware out there) but to combat this there are actually several more altruistic ways in which you can use your NAS to help others and maybe the betterment of society. Currently, there are several different installable apps or deployable containers that you can install and run on your NAS system that (although modest in their power consumption) will allow the idle time that your NAS is left on to be used for a better purpose. From research into deciphering genetic and DNA coding to algorithms breaking and medical research, there are numerous different charitable and positive organisations out there that are able to take advantage of the aggregated extra hardware of hundreds and thousands of different machines remotely in efforts to achieve their goals.

If the idea of donating the unused resources of your NAS for more human benefiting methods interests you, use the links below to find out more (Click Below):

 


Articles Get Updated Regularly - Get an alert every time something gets added to this page!


This description contains links to Amazon. These links will take you to some of the products mentioned in today's content. As an Amazon Associate, I earn from qualifying purchases. Visit the NASCompares Deal Finder to find the best place to buy this device in your region, based on Service, Support and Reputation - Just Search for your NAS Drive in the Box Below

 

SEARCH IN THE BOX BELOW FOR NAS DEALS

Need Advice on Data Storage from an Expert?

We want to keep the free advice on NASCompares FREE for as long as we can. Since this service started back in Jan '18, We have helped hundreds of users every month solve their storage woes, but we can only continue to do this with your support. So please do choose to buy at Amazon US and Amazon UK on the articles when buying to provide advert revenue support or to donate/support the site below. Finally, for free advice about your setup, just leave a message in the comments below here at NASCompares.com and we will get back to you. Need Help? Where possible (and where appropriate) please provide as much information about your requirements, as then I can arrange the best answer and solution to your needs. Do not worry about your e-mail address being required, it will NOT be used in a mailing list and will NOT be used in any way other than to respond to your enquiry. [contact-form-7] Terms and Conditions Alternatively, why not ask me on the ASK NASCompares forum, by clicking the button below. This is a community hub that serves as a place that I can answer your question, chew the fat, share new release information and even get corrections posted. I will always get around to answering ALL queries, but as a one-man operation, I cannot promise speed! So by sharing your query in the ASK NASCompares section below, you can get a better range of solutions and suggestions, alongside my own.   This description contains links to Amazon. These links will take you to some of the products mentioned in today’s video. As an Amazon Associate, I earn from qualifying purchases

QNAP QLocker Recovery Walkthrough with QRescue Software

27 mai 2021 à 02:00

A Guide to Recovering Your NAS Files from the QLocker QNAP NAS Malware Attack

Good news for those of you whose QNAP NAS systems were affected by the QLocker Malware attack last month – a recoverable solution has been produced by QNAP on this (with assistance from 3rd party open source project PhotoRec) that, although a little long and technical, is a great deal more understandable than many QLocker solutions that have appeared yet. This new method does not need users to open SSH on their system and although there is a degree of command/code entry involved, it is moderately straightforward and will hopefully allow you to avoid paying the ransomware fee to recover files. This method centres around file recovery, rather than breaking the encryption, so like any data recovery practice, this is not going to be tremendously quick – i.e. it will be largely dictated by the volume of files that need recovery. It will be interesting to see how much QNAP HQ have learned from this Qlocker business, what can be done to avoid this in future and if QRescue and collaborative builds with recovery software like PhotoRec can build towards a standardized NAS tool that can be used more generally in recovery in the future. Nevertheless, below is the guide that was provided by QNAP and includes tools and links to resources that will help you get the recovery completed.

Important Note – Do not attempt this ‘casually’. This method is by no means as intrusive as other methods in the last few weeks that involved messaging with the encrypted files themselves but IS a guide you should be prepared to action from beginning to end in a single session – so make sure you have allowed a good stretch of time to do this! Additionally, you WILL need access to an external Hard Drive/SSD that is 1.5-2 times the size of the data you are trying to recover, as additional space is liked needed during the recovery of files before they are completed. Make sure the external drive is EMPTY as it WILL be formatted.

Step By Step Guide to Recovering Encryptioned QNAP NAS files from QLocker

Make sure your QNAP NAS is running normally and no firmware/restarts are scheduled during the process of running PhotoRec or QRescue on your NAS. Additionally, another reminder that the external HDD/SSD that you use for the recovered files from QLocker WILL be formatted during following these steps. This Guide covers:

  • Overview
  • Requirements

Steps

  • Part 1. Configure external HDD with the name “rescue” and create folders with the name “recup1” for recovery.
  • Part 2. Download and Manually Install the QRescue App
  • Part 3. Run PhotoRec
  • Part 4. Run QRescue
  • Part 5. Move the recovery data to your NAS.

Let’s begin.

Overview:

QRescue is the data recovery tool for Qlocker-encrypted 7z files. It contains:

  • PhotoRec (Open Source Project / GNU General Public License / Project Link):
    File recovery software designed to recover lost files from hard disks and CD-ROMs, and lost pictures (thus the Photo Recovery name) from the storage medium.
  • QRescue (Powered by QNAP):
    The script to recover file structures from the encrypted 7z files and PhotoRec files.

Requirements:

  • Download the QRescue app from this link.
    https://download.qnap.com/QPKG/QRescue.zip
  • Prepare an external hard disk drive with a capacity larger than the total used storage space on your NAS.
    • Note: It’s advised to prepare an external HDD with 1.5 to 2x free space than the total used storage space on your NAS. Additional space might be required during the recovery process. If the available space is less than the suggested value, error and other issues may occur.

Steps:

Part 1. Configure external HDD with the name “rescue” and create folders with the name “recup1” for recovery.

QRescue will process the recovery process to external drive first, and we need to do some configuration for this recovery process and create the specific destination and folder name.

  1. You need to prepare an external HDD that its usable capacity is larger than the total used storage size of your NAS. This is because you will recover the files to the external device first. Please check your used volume size first by clicking More > About on the QTS desktop.
  2. Insert the external drive to your NAS. Please go to Storage Manager > External Device > Select your external device > Click “Actions” > Click “Format” to format the external drive.
  3. The File System must be “EXT4”, and the Label name must be key in “rescue”. If these configuration is ready, please click “Format

    Notice:
    The QRescue app will use “rescue” as the external drive name. If you use other names, the recovery process might fail.
  4. (Optional) If you disable the admin account or you don’t use admin to login QTS, you might not see the external drive on the File Station. Please go to Control Panel > Privilege > Shared Folder > Edit Shared Folder Permission to enable or change read / write permission for “rescue” folder and to match the account that you log in the NAS.
    • Sample:
      Grant other administrator group account (Example: “_qnap_support” is the administrator group account for read/write permission to external hard drive naming “rescue”).

  5. Using File Station to check the volume for the correct external device name.
  6. Create the new folder and name as “recup1” (format: recup+{number}). If you have more than one storage volume, you need to add more folders for recovery.

    Notice:
    The QRescue app will use “recup+{number}” as the folder name. If you use other names, the recovery process might fail.

    Part 2. Download and Manually Install the QRescue App

    This QRescue app is a special build. Therefore, you need to manually install this app from the QTS App Center.

  7. Please go to this link to download the QRescue app.
    https://download.qnap.com/QPKG/QRescue.zip
  8. Please go to App Center > Click Install Manually > Click Browse to find the QRescue app location on your computer.
  9. After selecting the app location, you can click Install. Wait until the installation completes and open the QRescue app on QTS desktop or side-bar.
  10. When you open the QRescue app, you will see the web console. It can help to run PhotoRec and QRescue to recover your files.

    Part 3. Run PhotoRec

    Running PhotoRec can help you to recover the lost files from hard disks to the external drive. Now you will recover the NAS files to the “recup1” (example: recup+{disk_number}) folder on the external drive.

  11. Type this command and press Enter on your keyboard. You will start to run PhotoRec.
    Command:
    photorec
  12. Use Up/Down arrows to choose the hard drive. And you can start to select the NAS disk for running recovery by PhotoRec.
    • Sample:
      • /dev/mapper/cachedev1 as 1st data volume
      • /dev/mapper/cachedev2 as 2nd data volume
      • /dev/mapper/cachedev20 as 20th data volume
    • Note:
      You can check the number of data volumes in Storage & Snapshots > Storage/Snapshots
  13. Select the “ext4” partition and press “Enter
  14. Select the file system as [ ext2/ext3 ] and click “Enter” key.
  15. Select the space as [ Whole ] and click the “Enter” key.
  16. Now we need to select the external device’s folder as the recovery destination.
    • Source Destination: /share/external/DEV3301_01/qpkg/QRescue   [QRescue qpkg]
    • Recovery Destination: /share/rescue/recup1 [External Device]
    • Click “..” to go back to the upper level folder
      • Sample destination: External disk on QRescue app
      • Sample: External Device (name: rescue) > Destination Folder (name: recup1)
  17. Please click “C” on the keyboard when the destination is “/share/rescue/recup1”.
  18. Start to run the recovery process by PhotoRec. Now you can see the estimated time to completion.
  19. When you finish the PhotoRec, you can press enter when you select  [Quit] or type in “ctrl-c” to exit.

    Part 4. Run QRescue

    Run QRescue can help you to recover the files retrieved by PhotoRec. Now you will recover the files from the “recup+{number}” folder to the “restore+{number}” folder which auto creates on your external drive.

  20. Type this command and click Enter on your keyboard. You will start to run QRescue.
    Command:
    qrescue.sh
  21. (Optional) If you have two or more data volumes on your NAS, the screen will let you select which data volume you will start the process. Please type the number and press “enter”. If you only have one data volume, you might not see this step.

  22. (Optional) Now you can see the progress for which files were completed in the recovery process.
  23. When all of the QRescue process is completed, the screen will show the result summary and the process for sending the system log.
  24. QRescue app also will send the event log to QuLog Center / System Log and notify you on finishing the whole recovery process. If you have opened the QNAP support ticket, don’t forget to make the feedback for your case. QNAP support team will help you to double check. Thank you very much.

Part 5. Move the recovery data to your NAS.

You can move the recovery data to your NAS by File Station


 

So, did this QLocker recovery guide work for you? How did you find the PhotoRec and QRescue applications did their job? Let me know in the comments and share with others how well/poorly this guide helped you recover your files from ransomware encryption.

Alternatively, If you still need help choosing the NAS solution for your needs, use the NASCompares free advice section below. It is completely free, is not a subscription service and is manned by real humans (two humans actually, me and Eddie). We promise impartial advice, recommendations based on your hardware and budget, and although it might take an extra day or two to answer your question, we will get back to you.

 


Articles Get Updated Regularly - Get an alert every time something gets added to this page!


Visit the NASCompares Deal Finder to find the best place to buy this device in your region, based on Service, Support and Reputation - Just Search for your NAS Drive in the Box Below

 

SEARCH IN THE BOX BELOW FOR NAS DEALS

Need Advice on Data Storage from an Expert?

We want to keep the free advice on NASCompares FREE for as long as we can. Since this service started back in Jan '18, We have helped hundreds of users every month solve their storage woes, but we can only continue to do this with your support. So please do choose to buy at Amazon US and Amazon UK on the articles when buying to provide advert revenue support or to donate/support the site below. Finally, for free advice about your setup, just leave a message in the comments below here at NASCompares.com and we will get back to you. Need Help? Where possible (and where appropriate) please provide as much information about your requirements, as then I can arrange the best answer and solution to your needs. Do not worry about your e-mail address being required, it will NOT be used in a mailing list and will NOT be used in any way other than to respond to your enquiry. [contact-form-7] Terms and Conditions Alternatively, why not ask me on the ASK NASCompares forum, by clicking the button below. This is a community hub that serves as a place that I can answer your question, chew the fat, share new release information and even get corrections posted. I will always get around to answering ALL queries, but as a one-man operation, I cannot promise speed! So by sharing your query in the ASK NASCompares section below, you can get a better range of solutions and suggestions, alongside my own.  

Vulnerabilities and Exploits on Synology & QNAP NAS – Stay Updated!

26 mai 2021 à 15:00

Be Regularly Updated on Security Concerns with Synology & QNAP NAS

Recently there has been a spotlight on some NAS brands and their security and protection from attacks by hackers and online intruders. In some cases, this has been down to holes being found in the system software or system protocol over time that, if left unpatched can lead to Ransomware like the QNAP QLocker of 2021, the Synology Synolocker of 2014. Typically, these can stem from many methods but ultimately revolve around hackers boarding the latest firmware and finding loopholes/backdoors within the system software each time it has an official update. This is not unusual and practically ALL the computer software-related services and hardware in your home/business environment go through this – most updates to the firmware in everything from your phone to your TV, router, console and more are specifically designed to close these newly found chinks in the armour. It is a constant game of cat and mouse, however, in almost all cases the vulnerability in software (that led to your system being penetrated) will be down to the fact your device has not been updated in firmware/software in a considerable length of time.

Why Do People Not Update Their QNAP or Synology NAS System Software Immediately?

Of course, updating the firmware on your NAS every single time a new system software version is released is not quite as simple as that. Sure, the actually ACT of updating is super easy and the NAS system will constantly remind you of updates in your system firmware or individual app software – but many still do not immediately action this update. This is by no means exclusive to NAS either, with many, MANY users choosing to ignore the windows update icon at the bottom right of the screen right now, or the recommended system update restart/remind option at the top right on a Mac. There are several reasons that people do not immediately update their firmware, such as:

  • The system is currently in use and there is no time right now to allow a restart, as well as having current projects/tabs/services operational
  • You once/twice experienced an update on a NAS (or really any device that has regular updates) that made the system unable to perform to the previous standard (software feature changed/removed), so you had to perform a complicated firmware roll-back/downgrade and it left you less keen on immediately firmware actions
  • It is a major firmware update that changes the system GUI and system options notable, so you do not wish to action a software update that will increase the learning curve
  • (less common but certainly happens) Your NAS system is part of a wider network of systems (part of a CMS) that either cannot or is not recommended to be individually updated without updating every other system at the same time

So, it is all fair and well for me to say ‘you should always update’, but the truth is that many have rather valid/understandable reasons for not actioning these straight away. Of course, the alternative would be for brands to automatically FORCE system updates through, or restrict an app/system able to connect with online services until the update is installed (as found with gaming services like Playstation Network and XBox Live) – but in a NAS, or even desktop/computer/phone-based systems these options would be INCREDIBLY UNPOPULAR! So, that is how we reached the current state of affairs between the NAS Brands, their system updates, individual app updates and how/when users choose to action them. So, how do we resolve this?

 

How to Remove QSnatch from your QNAP NAS Protecting Your Synology NAS from Ransomware
What is QNAP QLocker? How to Remove QLocker from your QNAP NAS

How Can You Stay On Top Of NAS Updates and Be Aware of Vulnerabilities on your NAS?

Many users might not be aware, but the majority of NAS brands (and indeed this extends to enterprise service providers like NetApp, cloud storage like Google Drive and large blob type storage like AWS and Azure) have an online portal that, known as the Security Advisory, that details the latest vulnerabilities, issues, faults and issues that are raised on their respective platforms. These are then available for public view (as they are submitted) and their effect, danger, current investigated status, date of the resolution and recommended action are then displayed. See Below:

Click to view slideshow.

 

These pages are almost certainly a legal requirement as part of their term of service and due diligence, not just a kind and wholesome gesture. However, it can be INCREDIBLY INTIMIDATING to read through them – even a 5-minute glance will make you question how on earth you have not been hacked yet! However, many of these vulnerabilities are exceptionally small and are built on exceptionally outdated firmware (perhaps 2-3 years overdue), require exceptionally weak security settings in place, DMZ network settings or simply are specific to a particular tool being used in a certain way. Nevertheless, many users will see these listings of issues and go one of two ways. One, they IMMEDIATELY UPDATE EVERYTHING and regularly update as soon as updates appear (regardless of the reasons against it listed earlier). Two, they look at the vulnerabilities, scroll through, see that none of them appear to be applicable to their own network hardware/storage setup and then continue to not-update until something more specific to their setup appears. There are pros and cons to either action of course, but better to have all the facts and listed vulnerabilities at your disposal than to proceed on just hunches and guesses!

How to Automatically Get Updated When Synology and QNAP NAS Vulnerabilities are Reported

Pretty much ALL of the brands in NAS, Data Storage and Cloud services have these security advisory pages, but the idea of checking these pages manually (i.e. bookmark etc) every day, week or month is too much of a hassle for many. On the other hand, they all arrive with an RSS feed link that allows users to subscribe to updates BUT many users are not even aware of how to apply an RSS feed (it’s a complex XML feed of text that needs to be injected into an appropriate RSS feed client/agent – so yeah, hardly noob friendly). So, in order to make this 1000x easier, I have (and by me, I mean Eddie the Web Guy spent time on it and I made this article!) made this page that will be constantly updated with the latest vulnerabilities reported on the popular NAS brands and storage-related manufacturers. It is still being built (so more brands are being added) but it will allow you to just chuck your email address below (will not be used for profit or spamming etc) and then you will get an alter EVERY TIME a new security vulnerability is updated by the brands (this is automated, so it will appear here as soon as it appears on the respective security advisory page). Additionally, there will be links back to the brand/manufacturer site so you can find out more about individual exploits and vulnerabilities, how they work, what they do and (most importantly) give you a better idea of whether you should update your NAS/Storage system or not. I hope you find it helpful and if you have any recommendations or idea of what we should add to this page/service to make it even better – let us know in the comments or directing here – https://nascompares.com/contact-us

Sign Up Below to Get Updates as New Vulnerabilities Are Reported


Articles Get Updated Regularly - Get an alert every time something gets added to this page!


 

QNAP NAS Current Vulnerabilities and Exploits [OPEN 🔗]

Command Injection in QTS Thu, 24 Jun Link
Command Injection in QTS Insecure Storage of Sensitive Information in myQNAPcloud Link Wed, 16 Jun Link
Insecure Storage of Sensitive Information in myQNAPcloud Link SMB Out-of-Bounds Read in QTS Wed, 16 Jun Link
SMB Out-of-Bounds Read in QTS Out-of-Bounds Read in QSS Fri, 11 Jun Link
Out-of-Bounds Read in QSS Inclusion of Sensitive Information in QSS Fri, 11 Jun Link
Inclusion of Sensitive Information in QSS Improper Access Control in Helpdesk Fri, 11 Jun Link
Improper Access Control in Helpdesk Post-Authentication Reflected XSS in Qcenter Thu, 03 Jun Link
Post-Authentication Reflected XSS in Qcenter Command Injection in Video Station Thu, 03 Jun Link
Command Injection in Video Station DOM-Based XSS in QTS Thu, 03 Jun Link
DOM-Based XSS in QTS Relative Path Traversal in QTS Fri, 21 May Link
Relative Path Traversal in QTS Qlocker Ransomware Fri, 21 May Link
Qlocker Ransomware in Roon Server Fri, 14 May Link
in Roon Server eCh0raix Ransomware Fri, 14 May Link
eCh0raix Ransomware Command Injection in Malware Remover Thu, 13 May Link
Command Injection in Malware Remover Improper Access Control in Music Station Thu, 06 May Link
Improper Access Control in Music Station AgeLocker Ransomware Thu, 29 Apr Link
AgeLocker Ransomware Improper Authorization in HBS 3 (Hybrid Backup Sync) Thu, 22 Apr Link
Improper Authorization in HBS 3 (Hybrid Backup Sync) SQL Injection in Multimedia Console and the Fri, 16 Apr Link
SQL Injection in Multimedia Console and the Command Injection in QTS Fri, 16 Apr Link
Command Injection in QTS Cross-site Scripting in File Station Fri, 16 Apr Link
Cross-site Scripting in File Station

 

SYNOLOGY NAS Current Vulnerabilities and Exploits [OPEN 🔗]

Synology-SA-21:21 Audio Station Important Resolved 2021-06-16 16:05:29 UTC+8
Synology-SA-21:20 FragAttacks Moderate Ongoing 2021-05-12 18:26:08 UTC+8
Synology-SA-21:19 SRM Important Resolved 2021-05-11 14:23:32 UTC+8
Synology-SA-21:18 Hyper Backup Moderate Resolved 2021-05-04 13:37:52 UTC+8
Synology-SA-21:17 Samba Moderate Ongoing 2021-05-06 11:28:17 UTC+8
Synology-SA-21:16 ISC BIND Moderate Ongoing 2021-05-03 10:34:51 UTC+8
Synology-SA-21:15 Antivirus Essential Important Resolved 2021-04-28 08:12:48 UTC+8
Synology-SA-21:14 OpenSSL Not affected Resolved 2021-03-29 08:56:36 UTC+8
Synology-SA-21:13 Samba AD DC Important Ongoing 2021-05-13 17:31:08 UTC+8
Synology-SA-21:12 Synology Calendar Moderate Resolved 2021-06-19 10:53:03 UTC+8
Synology-SA-21:11 Download Station Important Resolved 2021-06-19 11:15:17 UTC+8
Synology-SA-21:10 Media Server Moderate Resolved 2021-06-19 10:55:28 UTC+8
Synology-SA-21:09 WebDAV Server Moderate Resolved 2021-02-23 11:18:19 UTC+8
Synology-SA-21:08 Docker Low Resolved 2021-06-13 11:21:28 UTC+8
Synology-SA-21:07 Synology Directory Server Moderate Resolved 2021-02-23 11:17:51 UTC+8
Synology-SA-21:06 CardDAV Server Important Resolved 2021-02-23 11:17:26 UTC+8
Synology-SA-21:05 Audio Station Important Resolved 2021-02-23 09:52:31 UTC+8
Synology-SA-21:04 Video Station Moderate Resolved 2021-06-10 16:25:07 UTC+8
Synology-SA-21:03 DSM Important Pending 2021-06-11 09:45:46 UTC+8
Synology-SA-21:02 Sudo Low Ongoing 2021-06-02 17:00:07 UTC+8

 

ASUSTOR NAS Vulnerabilities and Exploits [OPEN 🔗]


05 24 2021 Security advisory for FragAttack
03 29 2021 ASUS ASMB8-iKVM and ASMB9-iKVM Firmware Security Update for ASUS Server Products
03 24 2021 ASUS SMM Privilege Security Update (CVE-2021-26943) for ASUS SKL Notebook PCs
03 09 2021 Security advisory for DNSpooq
07 10 2020 ASUS ScreenPad 2 Upgrade Tool Security Update (CVE-2020-15009) for ASUS PCs with ScreenPad 1.0 (UX450FDX, UX550GDX and UX550GEX)
04 14 2020 ASUS Update Regarding Mitigation for Known Intel CPU Vulnerabilities
04 09 2020 ASUS Device Activation Security Update (CVE-2020-10649) for ASUS Notebook PCs
03 18 2020 Security Advisory for CVE-2019-15126 (Kr00k)
03 09 2020 Security Notice for CVE-2018-18287
02 14 2020 ROG Gaming Center Package Security Update
11 26 2019 New firmware update for wireless router RT-AC1750_B1 RT-AC1900 RT-AC1900P RT-AC1900U RT-AC86U RT-AC2900 RT-AC3100 RT-AC3200 RT-AC51U RT-AC51U+ RT-AC52U B1 RT-AC66U RT-AC66U B1 RT-AC66U_WHITE RT-AC67U RT-AC68P RT-AC68R RT-AC68RF RT-AC68RW RT-AC68U RT-AC68U 2 Pack RT-AC68U_WHITE RT-AC68W RT-AC750 RT-AC87R RT-AC87U RT-AC87W RT-N66U RT-N66U_C1 RT-N14U
11 15 2019 Important information about ASUSWRT security:
10 21 2019 ATK Package Security Update (CVE-2019-19235) for ASUS Notebook PCs
06 14 2019 BIOS Update Announcement for ASUS Notebook PCs
05 16 2019 New firmware update for wireless router RT-AC1750_B1 RT-AC1900 RT-AC1900P RT-AC1900U RT-AC2900 RT-AC3100 RT-AC3200 RT-AC51U RT-AC5300 RT-AC56S RT-AC56U RT-AC66U RT-AC66U B1 RT-AC66U_WHITE RT-AC67U RT-AC68P RT-AC68R RT-AC68RF RT-AC68RW RT-AC68U RT-AC68U 2 Pack RT-AC68U_WHITE RT-AC68W RT-AC750 RT-AC86U RT-AC87R RT-AC87U RT-AC87W RT-AC88U RT-N18U RT-N66U RT-N66U_C1
05 02 2019 Latest software announcement for ZenFone devices
08 14 2018 Security advisory for OpenVPN server
08 07 2018 Latest software announcement for ZenFone ZenPad devices
06 08 2018 Security advisory for VPNFilter malware
04 03 2018 Security Vulnerability Notice (CVE-2018-5999, CVE-2018-6000) for ASUS routers
10 31 2017 Update on security advisory for the vulnerability of WPA2 protocol
10 18 2017 Security advisory for the vulnerabilities of WPA2 protocol
2021 & 8711;
2020 & 8711;
2019 & 8711;
2018 & 8711;
2017 & 8711;
2016 & 8711;

 

Work In Progress – More Security Advisory Updates and Reports Coming Soon for Other Brands

 

 

❌