We have already fixed the vulnerability in the following version:
Qsync Central 4.5.0.7 ( 2025/04/23 ) and later
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27835 | A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: Qsync Central 4.5.0.7 ( 2025/04/23 ) and later |
Solution
We have already fixed the vulnerability in the following version: Qsync Central 4.5.0.7 ( 2025/04/23 ) and later
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-25-22 |
|
Fri, 19 Sep 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qnap
Qnap qsync Central |
|
| CPEs | cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Qnap
Qnap qsync Central |
|
| Metrics |
cvssV3_1
|
Fri, 29 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 29 Aug 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: Qsync Central 4.5.0.7 ( 2025/04/23 ) and later | |
| Title | Qsync Central | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2025-08-29T18:21:59.165Z
Reserved: 2025-04-15T15:14:26.907Z
Link: CVE-2025-33036
Updated: 2025-08-29T18:16:41.453Z
Status : Analyzed
Published: 2025-08-29T18:15:41.267
Modified: 2025-09-19T17:05:34.643
Link: CVE-2025-33036
No data.
OpenCVE Enrichment
No data.
EUVD