A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory.

We have already fixed the vulnerability in the following version:
Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

Project Subscriptions

Vendors Products
Qsync Central Subscribe
Qnap Systems Subscribe
Qsync Central Subscribe
Advisories

No advisories yet.

Fixes

Solution

We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later


Workaround

No workaround given by the vendor.

History

Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Qnap Systems
Qnap Systems qsync Central
Vendors & Products Qnap Systems
Qnap Systems qsync Central

Wed, 11 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Qnap
Qnap qsync Central
CPEs cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:*
Vendors & Products Qnap
Qnap qsync Central
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Wed, 11 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
Description A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later
Title Qsync Central
Weaknesses CWE-134
References
Metrics cvssV4_0

{'score': 0.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: qnap

Published:

Updated: 2026-02-11T14:27:09.111Z

Reserved: 2025-03-20T02:53:25.309Z

Link: CVE-2025-30269

cve-icon Vulnrichment

Updated: 2026-02-11T14:27:02.516Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-11T13:15:51.957

Modified: 2026-02-11T21:10:50.490

Link: CVE-2025-30269

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-11T21:38:16Z

Weaknesses