A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to obtain secret data or modify memory.
We have already fixed the vulnerability in the following version:
Qsync Central 4.5.0.6 ( 2025/03/20 ) and later
References
| Link | Resource |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-25-10 | Vendor Advisory |
Configurations
History
20 Sep 2025, 03:33
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:* | |
| First Time |
Qnap qsync Central
Qnap |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
| References | () https://www.qnap.com/en/security-advisory/qsa-25-10 - Vendor Advisory |
09 Jun 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
06 Jun 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-06 16:15
Updated : 2025-09-20 03:33
NVD link : CVE-2025-22482
Mitre link : CVE-2025-22482
CVE.ORG link : CVE-2025-22482
JSON object : View
Products Affected
qnap
- qsync_central
CWE
CWE-134
Use of Externally-Controlled Format String
