A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to obtain secret data or modify memory.
We have already fixed the vulnerability in the following version:
Qsync Central 4.5.0.6 ( 2025/03/20 ) and later
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-25-10 |
|
History
Fri, 06 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Jun 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to obtain secret data or modify memory. We have already fixed the vulnerability in the following version: Qsync Central 4.5.0.6 ( 2025/03/20 ) and later | |
| Title | Qsync Central | |
| Weaknesses | CWE-134 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: qnap
Published: 2025-06-06T15:53:28.822Z
Updated: 2025-06-06T16:35:24.146Z
Reserved: 2025-01-07T06:55:33.249Z
Link: CVE-2025-22482
Updated: 2025-06-06T16:19:16.854Z
Status : Awaiting Analysis
Published: 2025-06-06T16:15:24.023
Modified: 2025-06-09T12:15:47.880
Link: CVE-2025-22482
No data.