QuRouter
Summary
| CVE | CVE-2025-62843 |
|---|---|
| State | PUBLISHED |
| Assigner | qnap |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-20 17:16:42 UTC |
| Updated | 2026-04-14 14:19:26 UTC |
| Description | An improper restriction of communication channel to intended endpoints vulnerability has been reported to affect QHora. If an attacker gains physical access, they can then exploit the vulnerability to gain the privileges that were intended for the original endpoint. We have already fixed the vulnerability in the following version: QuRouter 2.6.3.009 and later |
Risk And Classification
Primary CVSS: v4.0 0.9 LOW from [email protected]
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
EPSS: 0.000240000 probability, percentile 0.063260000 (date 2026-04-15)
Problem Types: CWE-923 | CWE-923 CWE-923
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 4.0 | [email protected] | Secondary | 0.9 | LOW | CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:U/C... |
| 4.0 | CNA | CVSS | 0.9 | LOW | CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:U |
| 3.1 | [email protected] | Primary | 6.8 | MEDIUM | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVSS v4.0 Breakdown
Attack Vector
PhysicalAttack Complexity
LowAttack Requirements
NonePrivileges Required
NoneUser Interaction
NoneConfidentiality
NoneIntegrity
NoneAvailability
NoneSub Conf.
HighSub Integrity
LowSub Availability
NoneCVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CVSS v3.1 Breakdown
Attack Vector
PhysicalAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Qnap | Qurouter | 2.6.0.239 | build_20250625 | All | All |
| Operating System | Qnap | Qurouter | 2.6.0.688 | build_20250818 | All | All |
| Operating System | Qnap | Qurouter | 2.6.1.028 | build_20251001 | All | All |
| Operating System | Qnap | Qurouter | 2.6.2.007 | build_20251027 | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | QNAP Systems Inc. | QuRouter | affected 2.6.x 2.6.3.009 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.qnap.com/en/security-advisory/qsa-26-12 | [email protected] | www.qnap.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Pwn2Own 2025 - Team DDOS (en)
Additional Advisory Data
Solutions
CNA: We have already fixed the vulnerability in the following version: QuRouter 2.6.3.009 and later
There are currently no legacy QID mappings associated with this CVE.