CVE-2025-47210
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-03

Last updated on: 2025-10-08

Assigner: QNAP Systems, Inc.

Description
A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.2 ( 2025/07/31 ) and later
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-03
Last Modified
2025-10-08
Generated
2026-05-07
AI Q&A
2025-10-03
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
qnap qsync_central From 5.0.0.0 (inc) to 5.0.0.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-476 The product dereferences a pointer that it expects to be valid but is NULL.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a NULL pointer dereference in Qsync Central. It can be exploited by a remote attacker who has gained a user account to cause a denial-of-service (DoS) attack, making the service unavailable.


How can this vulnerability impact me? :

If exploited, this vulnerability can cause a denial-of-service (DoS) attack, disrupting the availability of Qsync Central services and potentially impacting business operations relying on it.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately upgrade Qsync Central to version 5.0.0.2 (released 2025/07/31) or later.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart