A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.
We have already fixed the vulnerability in the following version:
Qsync Central 5.0.0.1 ( 2025/07/09 ) and later
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-25-34 |
![]() ![]() |
History
Fri, 03 Oct 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 03 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.1 ( 2025/07/09 ) and later | |
Title | Qsync Central | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2025-10-03T18:36:27.297Z
Reserved: 2025-04-15T15:14:26.907Z
Link: CVE-2025-33034

Updated: 2025-10-03T18:36:22.586Z

Status : Received
Published: 2025-10-03T18:15:34.763
Modified: 2025-10-03T18:15:34.763
Link: CVE-2025-33034

No data.

No data.