A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory.
We have already fixed the vulnerability in the following version:
Qsync Central 5.0.0.4 ( 2026/01/20 ) and later
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-26-02 |
|
History
Wed, 11 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qnap
Qnap qsync Central |
|
| CPEs | cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Qnap
Qnap qsync Central |
|
| Metrics |
cvssV3_1
|
Wed, 11 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later | |
| Title | Qsync Central | |
| Weaknesses | CWE-134 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: qnap
Published: 2026-02-11T12:19:57.092Z
Updated: 2026-02-11T14:27:09.111Z
Reserved: 2025-03-20T02:53:25.309Z
Link: CVE-2025-30269
Updated: 2026-02-11T14:27:02.516Z
Status : Analyzed
Published: 2026-02-11T13:15:51.957
Modified: 2026-02-11T21:10:50.490
Link: CVE-2025-30269
No data.