Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57710: CWE-770 in QNAP Systems Inc. Qsync Central

0
Low
VulnerabilityCVE-2025-57710cvecve-2025-57710cwe-770
Published: Wed Feb 11 2026 (02/11/2026, 12:17:16 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: Qsync Central

Description

CVE-2025-57710 is a resource allocation vulnerability in QNAP Systems Inc. 's Qsync Central version 5. 0. x. x. A remote attacker with administrator privileges can exploit this flaw to exhaust specific system resources without limits or throttling, causing denial of service to other systems, applications, or processes relying on the same resources. The vulnerability does not require user interaction but does require high privileges (administrator access). It has a CVSS 4. 0 base score of 3. 6, indicating low severity.

AI-Powered Analysis

AILast updated: 02/18/2026, 15:12:37 UTC

Technical Analysis

CVE-2025-57710 is classified under CWE-770, which involves allocation of resources without limits or throttling. This vulnerability affects QNAP Systems Inc.'s Qsync Central product, specifically version 5.0.x.x. The flaw allows a remote attacker who has already obtained administrator-level access to exploit the system by allocating resources excessively without any enforced limits. This can lead to resource exhaustion, preventing other legitimate systems, applications, or processes from accessing or utilizing the same type of resources, effectively causing a denial of service condition. The vulnerability does not require user interaction but does require privileged access, making it an insider or post-compromise threat. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:H), no user interaction (UI:N), no impact on confidentiality, integrity, or availability (VC:N/VI:N/VA:H), and scope unchanged (SC:N). The vulnerability was reserved in August 2025 and published in February 2026, with a patch released in Qsync Central 5.0.0.4 on January 20, 2026. No public exploits have been reported, suggesting limited active exploitation. However, the potential for denial of service within environments relying heavily on Qsync Central for synchronization and file sharing is significant if exploited.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential denial of service caused by resource exhaustion within Qsync Central environments. Organizations relying on Qsync Central for critical file synchronization and collaboration may experience service degradation or outages, impacting business continuity and productivity. Since exploitation requires administrator privileges, the threat is more relevant in scenarios where internal threat actors or attackers who have already compromised administrative accounts exist. The lack of confidentiality or integrity impact reduces the risk of data breaches directly from this vulnerability, but service availability disruptions can still have significant operational consequences. Industries with high dependency on QNAP NAS devices, such as SMBs, healthcare, education, and government agencies across Europe, could face interruptions if this vulnerability is exploited. Additionally, the absence of throttling could be leveraged in targeted attacks to disrupt operations during critical periods.

Mitigation Recommendations

European organizations using Qsync Central should immediately upgrade to version 5.0.0.4 or later, where the vulnerability has been patched. Beyond patching, organizations should enforce strict administrative access controls and monitor for unusual resource consumption patterns indicative of exploitation attempts. Implement network segmentation to limit administrative access to Qsync Central systems and employ multi-factor authentication to reduce the risk of credential compromise. Regularly audit administrator accounts and review logs for suspicious activity. Additionally, establish resource usage monitoring and alerting on Qsync Central servers to detect abnormal allocation spikes. In environments where patching cannot be immediate, consider temporarily restricting administrative access to trusted personnel only and isolating vulnerable systems from critical network segments to minimize impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2025-08-18T08:29:27.068Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698c7a1f4b57a58fa195d094

Added to database: 2/11/2026, 12:46:23 PM

Last enriched: 2/18/2026, 3:12:37 PM

Last updated: 2/21/2026, 12:20:20 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats