CVE-2025-33033
BaseFortify
Publication date: 2025-08-29
Last updated on: 2025-09-19
Assigner: QNAP Systems, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| qnap | qsync_central | From 4.5.0.3 (inc) to 4.5.0.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a path traversal issue in Qsync Central. It allows a remote attacker who has gained a user account to exploit the vulnerability to read files or system data that they should not normally have access to.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker to access sensitive or unexpected files on the system, potentially leading to unauthorized disclosure of information or system data compromise.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately update Qsync Central to version 4.5.0.7 or later, where the vulnerability has been fixed. Additionally, restrict user account access to trusted users only to reduce the risk of exploitation.