A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory.
We have already fixed the vulnerability in the following version:
Qsync Central 5.0.0.4 ( 2026/01/20 ) and later
References
| Link | Resource |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-26-02 | Vendor Advisory |
Configurations
History
11 Feb 2026, 21:10
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
| First Time |
Qnap qsync Central
Qnap |
|
| References | () https://www.qnap.com/en/security-advisory/qsa-26-02 - Vendor Advisory | |
| CPE | cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:* |
11 Feb 2026, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-11 13:15
Updated : 2026-02-11 21:10
NVD link : CVE-2025-30269
Mitre link : CVE-2025-30269
CVE.ORG link : CVE-2025-30269
JSON object : View
Products Affected
qnap
- qsync_central
CWE
CWE-134
Use of Externally-Controlled Format String
