We have already fixed the vulnerability in the following version:
Qsync Central 5.0.0.2 ( 2025/07/31 ) and later
Metrics
Affected Vendors & Products
Solution
We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.2 ( 2025/07/31 ) and later
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-25-35 |
![]() ![]() |
Fri, 03 Oct 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 03 Oct 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.2 ( 2025/07/31 ) and later | |
Title | Qsync Central | |
Weaknesses | CWE-476 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2025-10-03T18:52:15.445Z
Reserved: 2025-05-02T05:58:18.475Z
Link: CVE-2025-47210

Updated: 2025-10-03T18:52:09.683Z

Status : Received
Published: 2025-10-03T19:15:43.647
Modified: 2025-10-03T19:15:43.647
Link: CVE-2025-47210

No data.

No data.