{
    "containers": {
        "cna": {
            "affected": [
                {
                    "defaultStatus": "unaffected",
                    "product": "Qsync Central",
                    "vendor": "QNAP Systems Inc.",
                    "versions": [
                        {
                            "lessThan": "5.0.0.4 ( 2026/01/20 )",
                            "status": "affected",
                            "version": "5.0.x.x",
                            "versionType": "custom"
                        }
                    ]
                }
            ],
            "credits": [
                {
                    "lang": "en",
                    "type": "finder",
                    "value": "coral"
                }
            ],
            "descriptions": [
                {
                    "lang": "en",
                    "supportingMedia": [
                        {
                            "base64": false,
                            "type": "text/html",
                            "value": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.<br><br>We have already fixed the vulnerability in the following version:<br>Qsync Central 5.0.0.4 ( 2026/01/20 ) and later<br>"
                        }
                    ],
                    "value": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later\n"
                }
            ],
            "impacts": [
                {
                    "capecId": "CAPEC-129",
                    "descriptions": [
                        {
                            "lang": "en",
                            "value": "CAPEC-129"
                        }
                    ]
                }
            ],
            "metrics": [
                {
                    "cvssV4_0": {
                        "attackComplexity": "LOW",
                        "attackRequirements": "NONE",
                        "attackVector": "NETWORK",
                        "baseScore": 5.3,
                        "baseSeverity": "MEDIUM",
                        "exploitMaturity": "UNREPORTED",
                        "privilegesRequired": "LOW",
                        "subAvailabilityImpact": "NONE",
                        "subConfidentialityImpact": "NONE",
                        "subIntegrityImpact": "NONE",
                        "userInteraction": "NONE",
                        "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
                        "version": "4.0",
                        "vulnAvailabilityImpact": "LOW",
                        "vulnConfidentialityImpact": "NONE",
                        "vulnIntegrityImpact": "NONE"
                    },
                    "format": "CVSS",
                    "scenarios": [
                        {
                            "lang": "en",
                            "value": "GENERAL"
                        }
                    ]
                }
            ],
            "problemTypes": [
                {
                    "descriptions": [
                        {
                            "cweId": "CWE-476",
                            "description": "CWE-476",
                            "lang": "en",
                            "type": "CWE"
                        }
                    ]
                }
            ],
            "providerMetadata": {
                "orgId": "2fd009eb-170a-4625-932b-17a53af1051f"
            },
            "references": [
                {
                    "url": "https://www.qnap.com/en/security-advisory/qsa-26-02"
                }
            ],
            "solutions": [
                {
                    "lang": "en",
                    "supportingMedia": [
                        {
                            "base64": false,
                            "type": "text/html",
                            "value": "We have already fixed the vulnerability in the following version:<br>Qsync Central 5.0.0.4 ( 2026/01/20 ) and later<br>"
                        }
                    ],
                    "value": "We have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later\n"
                }
            ],
            "source": {
                "advisory": "QSA-26-02",
                "discovery": "EXTERNAL"
            },
            "title": "Qsync Central",
            "x_generator": {
                "engine": "Vulnogram 0.1.0-dev"
            }
        }
    },
    "cveMetadata": {
        "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "cveId": "CVE-2025-54146",
        "serial": 1,
        "state": "PUBLISHED"
    },
    "dataType": "CVE_RECORD",
    "dataVersion": "5.1"
}