EUVD-2025-17342

| CVE-2025-29892 HIGH
2025-06-06 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 18:10 euvd
EUVD-2025-17342
Analysis Generated
Mar 14, 2026 - 18:10 vuln.today
CVE Published
Jun 06, 2025 - 16:15 nvd
HIGH 8.8

Description

An SQL injection vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to execute unauthorized code or commands. We have already fixed the vulnerability in the following version: Qsync Central 4.5.0.6 ( 2025/03/20 ) and later

Analysis

SQL injection vulnerability in Qsync Central that allows authenticated remote attackers to execute arbitrary code or commands with high impact on confidentiality, integrity, and availability. The vulnerability affects all versions prior to Qsync Central 4.5.0.6 (released 2025/03/20), and while no active KEV or public PoC is explicitly referenced in the provided data, the high CVSS score of 8.8 combined with low attack complexity and low privilege requirements indicates this is a serious, readily exploitable vulnerability that should be prioritized for patching.

Technical Context

The vulnerability is rooted in CWE-89 (SQL Injection), a classic input validation flaw where user-supplied data is improperly sanitized before being incorporated into SQL queries. In Qsync Central, this flaw allows attackers who have already obtained legitimate user credentials to inject malicious SQL commands through input fields or parameters. The vulnerability exists in the application's database query handling logic, likely in administrative, reporting, or configuration interfaces where SQL queries are dynamically constructed. Unlike unauthenticated SQL injection, this variant requires an attacker to first gain or possess valid user credentials (PR:L in CVSS), which limits the initial attack surface but still poses significant risk in multi-tenant or enterprise environments where account compromise is common.

Affected Products

Qsync Central versions prior to 4.5.0.6 are affected. Specific affected versions include but are not limited to all releases before 2025/03/20. The vendor has confirmed that Qsync Central 4.5.0.6 and all subsequent releases contain the fix. Organizations running any version of Qsync Central older than 4.5.0.6 should be considered at risk. CPE strings would typically follow the pattern cpe:2.3:a:qnap:qsync_central:*:*:*:*:*:*:*:* with version constraints less than 4.5.0.6. Affected organizations include QNAP NAS customers utilizing Qsync Central for file synchronization and management.

Remediation

Immediate action: Upgrade Qsync Central to version 4.5.0.6 or later (released 2025/03/20). This is the vendor-confirmed fix and should be applied as soon as possible. For organizations unable to immediately patch, implement the following mitigations: (1) restrict network access to Qsync Central administrative interfaces using firewall rules or VPN-only access; (2) enforce strong password policies and multi-factor authentication for all Qsync Central user accounts to reduce the likelihood of credential compromise; (3) monitor database access logs and SQL query patterns for signs of injection attempts; (4) disable or restrict SQL query logging if not actively needed, as malicious queries may appear in logs; (5) implement database-level access controls limiting the permissions of the Qsync Central service account. Patch deployment is strongly recommended over workarounds due to the severity and ease of exploitation.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: 0

Share

EUVD-2025-17342 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy