CVE-2025-30269

A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:*

History

11 Feb 2026, 21:10

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
First Time Qnap qsync Central
Qnap
References () https://www.qnap.com/en/security-advisory/qsa-26-02 - () https://www.qnap.com/en/security-advisory/qsa-26-02 - Vendor Advisory
CPE cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:*

11 Feb 2026, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-11 13:15

Updated : 2026-02-11 21:10


NVD link : CVE-2025-30269

Mitre link : CVE-2025-30269

CVE.ORG link : CVE-2025-30269


JSON object : View

Products Affected

qnap

  • qsync_central
CWE
CWE-134

Use of Externally-Controlled Format String