A link following vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.
We have already fixed the vulnerability in the following versions:
Qsync Central 4.4.0.16_20240819 ( 2024/08/19 ) and later
References
| Link | Resource |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-24-48 | Vendor Advisory |
Configurations
History
10 Dec 2025, 21:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.qnap.com/en/security-advisory/qsa-24-48 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| Summary |
|
|
| First Time |
Qnap qsync Central
Qnap |
|
| CPE | cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:* |
06 Dec 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-12-06 17:15
Updated : 2025-12-10 21:59
NVD link : CVE-2024-50404
Mitre link : CVE-2024-50404
CVE.ORG link : CVE-2024-50404
JSON object : View
Products Affected
qnap
- qsync_central
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
