See this post for link to a script that decrypts the FW.

The steps are decrypt / untar / unsquashfs

python3 qnap-qts-fw-cryptor.py d HORA_301W HORA_301W_20240118-2.3.3.005.img HORA_301W_20240118-2.3.3.005_decrypted.img.tar
tar -xf HORA_301W_20240118-2.3.3.005_decrypted.img.tar ./usr.squashfs
sudo unsquashfs usr.squashfs

FW is located in /share/10G_FW/

edit:

I changed U-Boot bootcmd back to stock:

fw_setenv bootcmd "bootipq"

check with

fw_printenv -n bootcmd
3 Likes