A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.
We have already fixed the vulnerability in the following version:
Qsync Central 5.0.0.1 ( 2025/07/09 ) and later
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.qnap.com/en/security-advisory/qsa-25-34 |
![]() ![]() |
History
Fri, 03 Oct 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 03 Oct 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.1 ( 2025/07/09 ) and later | |
Title | Qsync Central | |
Weaknesses | CWE-476 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2025-10-03T18:43:01.411Z
Reserved: 2025-04-21T07:56:46.494Z
Link: CVE-2025-44010

Updated: 2025-10-03T18:42:56.082Z

Status : Received
Published: 2025-10-03T19:15:42.677
Modified: 2025-10-03T19:15:42.677
Link: CVE-2025-44010

No data.

No data.