Uncontrolled Resource Consumption in Qsync Central <5.0.0.4 DoS by Local Attacker
CVE-2025-54149 Published on February 11, 2026

Qsync Central
An uncontrolled resource consumption vulnerability has been reported to affect Qsync Central. If a local attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack. We have already fixed the vulnerability in the following version: Qsync Central 5.0.0.4 ( 2026/01/20 ) and later

NVD

Weakness Types

What is a Resource Exhaustion Vulnerability?

The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CVE-2025-54149 has been classified to as a Resource Exhaustion vulnerability or weakness.

Allocation of Resources Without Limits or Throttling

The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.

What is a Stack Exhaustion Vulnerability?

The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.

CVE-2025-54149 has been classified to as a Stack Exhaustion vulnerability or weakness.


Products Associated with CVE-2025-54149

Want to know whenever a new CVE is published for QNAP Qsync Central? stack.watch will email you.

 

Affected Versions

QNAP Systems Inc. Qsync Central:

Exploit Probability

EPSS
0.01%
Percentile
2.22%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.