Qsync Central NullPtr DoS (pre-5.0.0.4)
CVE-2025-47209 Published on February 11, 2026

Qsync Central
A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

NVD

Weakness Type

NULL Pointer Dereference

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit. NULL pointer dereference issues can occur through a number of flaws, including race conditions, and simple programming omissions.


Products Associated with CVE-2025-47209

Want to know whenever a new CVE is published for QNAP Qsync Central? stack.watch will email you.

 

Affected Versions

QNAP Systems Inc. Qsync Central:

Exploit Probability

EPSS
0.12%
Percentile
30.60%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.