CVE-2025-22482

A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to obtain secret data or modify memory. We have already fixed the vulnerability in the following version: Qsync Central 4.5.0.6 ( 2025/03/20 ) and later
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:*

History

20 Sep 2025, 03:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
CPE cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:*
First Time Qnap qsync Central
Qnap
References () https://www.qnap.com/en/security-advisory/qsa-25-10 - () https://www.qnap.com/en/security-advisory/qsa-25-10 - Vendor Advisory

09 Jun 2025, 12:15

Type Values Removed Values Added
Summary
  • (es) Se ha informado de una vulnerabilidad relacionada con el uso de cadenas de formato controladas externamente que afecta a Qsync Central. Si se explota, esta vulnerabilidad podría permitir a atacantes remotos con acceso de usuario obtener datos secretos o modificar la memoria. Ya hemos corregido la vulnerabilidad en la siguiente versión: Qsync Central 4.5.0.6 (20/03/2025) y posteriores.

06 Jun 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-06 16:15

Updated : 2025-09-20 03:33


NVD link : CVE-2025-22482

Mitre link : CVE-2025-22482

CVE.ORG link : CVE-2025-22482


JSON object : View

Products Affected

qnap

  • qsync_central
CWE
CWE-134

Use of Externally-Controlled Format String