See this post for link to a script that decrypts the FW.
The steps are decrypt / untar / unsquashfs
python3 qnap-qts-fw-cryptor.py d HORA_301W HORA_301W_20240118-2.3.3.005.img HORA_301W_20240118-2.3.3.005_decrypted.img.tar
tar -xf HORA_301W_20240118-2.3.3.005_decrypted.img.tar ./usr.squashfs
sudo unsquashfs usr.squashfs
FW is located in /share/10G_FW/
edit:
I changed U-Boot bootcmd back to stock:
fw_setenv bootcmd "bootipq"
check with
fw_printenv -n bootcmd
3 Likes