{
    "containers": {
        "cna": {
            "affected": [
                {
                    "defaultStatus": "unaffected",
                    "product": "Qsync Central",
                    "vendor": "QNAP Systems Inc.",
                    "versions": [
                        {
                            "lessThan": "5.0.0.4 ( 2026/01/20 )",
                            "status": "affected",
                            "version": "5.0.x.x",
                            "versionType": "custom"
                        }
                    ]
                }
            ],
            "credits": [
                {
                    "lang": "en",
                    "type": "finder",
                    "value": "coral"
                }
            ],
            "descriptions": [
                {
                    "lang": "en",
                    "supportingMedia": [
                        {
                            "base64": false,
                            "type": "text/html",
                            "value": "An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.<br><br>We have already fixed the vulnerability in the following version:<br>Qsync Central 5.0.0.4 ( 2026/01/20 ) and later<br>"
                        }
                    ],
                    "value": "An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later\n"
                }
            ],
            "impacts": [
                {
                    "capecId": "CAPEC-131",
                    "descriptions": [
                        {
                            "lang": "en",
                            "value": "CAPEC-131"
                        }
                    ]
                }
            ],
            "metrics": [
                {
                    "cvssV4_0": {
                        "attackComplexity": "LOW",
                        "attackRequirements": "PRESENT",
                        "attackVector": "NETWORK",
                        "baseScore": 6.9,
                        "baseSeverity": "MEDIUM",
                        "exploitMaturity": "UNREPORTED",
                        "privilegesRequired": "HIGH",
                        "subAvailabilityImpact": "HIGH",
                        "subConfidentialityImpact": "NONE",
                        "subIntegrityImpact": "NONE",
                        "userInteraction": "NONE",
                        "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H",
                        "version": "4.0",
                        "vulnAvailabilityImpact": "HIGH",
                        "vulnConfidentialityImpact": "NONE",
                        "vulnIntegrityImpact": "NONE"
                    },
                    "format": "CVSS",
                    "scenarios": [
                        {
                            "lang": "en",
                            "value": "GENERAL"
                        }
                    ]
                }
            ],
            "problemTypes": [
                {
                    "descriptions": [
                        {
                            "cweId": "CWE-770",
                            "description": "CWE-770",
                            "lang": "en",
                            "type": "CWE"
                        }
                    ]
                }
            ],
            "providerMetadata": {
                "orgId": "2fd009eb-170a-4625-932b-17a53af1051f"
            },
            "references": [
                {
                    "url": "https://www.qnap.com/en/security-advisory/qsa-26-02"
                }
            ],
            "solutions": [
                {
                    "lang": "en",
                    "supportingMedia": [
                        {
                            "base64": false,
                            "type": "text/html",
                            "value": "We have already fixed the vulnerability in the following version:<br>Qsync Central 5.0.0.4 ( 2026/01/20 ) and later<br>"
                        }
                    ],
                    "value": "We have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later\n"
                }
            ],
            "source": {
                "advisory": "QSA-26-02",
                "discovery": "EXTERNAL"
            },
            "title": "Qsync Central",
            "x_generator": {
                "engine": "Vulnogram 0.1.0-dev"
            }
        }
    },
    "cveMetadata": {
        "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f",
        "cveId": "CVE-2025-57710",
        "serial": 1,
        "state": "PUBLISHED"
    },
    "dataType": "CVE_RECORD",
    "dataVersion": "5.1"
}