Ce mail provient de l'extérieur, restons vigilants ===================================================================== CERT-Renater Note d'Information No. 2025/VULN781 _____________________________________________________________________ DATE : 10/11/2025 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Qsync Central versions prior to 5.0.0.3 (2025/08/28). ===================================================================== https://www.qnap.com/en/security-advisory/qsa-25-41 _____________________________________________________________________ Security ID : QSA-25-41 Vulnerability in Qsync Central Release date : November 8, 2025 CVE identifier : CVE-2025-57712 Affected products: Qsync Central 5.0.x Severity Important Status Resolved Summary A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains access to a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data. We have already fixed the vulnerability in the following version: Affected Product Fixed Version Qsync Central 5.0.x Qsync Central 5.0.0.3 (2025/08/28) and later Recommendation To fix the vulnerability, we recommend updating Qsync Central to the latest version. Updating Qsync Central Log on to QTS or QuTS hero as an administrator. Open App Center and then click . A search box appears. Type "Qsync Central" and then press ENTER. Qsync Central appears in the search results. Click Update. A confirmation message appears. Note: The Update button is not available if your Qsync Central is already up to date. Click OK. The system updates the application. Attachment CVE-2025-57712.json Acknowledgements: coral Revision History: V1.0 (November 8, 2025) - Published ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =========================================================