Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62843: CWE-923 in QNAP Systems Inc. QuRouter

0
Low
VulnerabilityCVE-2025-62843cvecve-2025-62843cwe-923
Published: Fri Mar 20 2026 (03/20/2026, 16:22:02 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: QuRouter

Description

An improper restriction of communication channel to intended endpoints vulnerability has been reported to affect QHora. If an attacker gains physical access, they can then exploit the vulnerability to gain the privileges that were intended for the original endpoint. We have already fixed the vulnerability in the following version: QuRouter 2.6.3.009 and later

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 21:37:42 UTC

Technical Analysis

CVE-2025-62843 is a security vulnerability identified in QNAP Systems Inc.'s QuRouter product, specifically affecting versions 2.6.x prior to 2.6.3.009. The vulnerability is classified under CWE-923, which pertains to improper restriction of communication channels to intended endpoints. In this context, the flaw allows an attacker who has gained physical access to the device to exploit the communication channel and assume privileges that should be restricted to the original endpoint. This means that the attacker can potentially intercept or redirect communications intended for a trusted endpoint, thereby gaining unauthorized access or control over certain device functions or data. The vulnerability does not require network access, authentication, or user interaction, but crucially depends on physical access to the device, which limits the attack surface. The CVSS 4.0 base score is 0.9, indicating a low severity due to the high complexity of exploitation (physical access required) and limited impact scope. The vendor has addressed the issue in QuRouter version 2.6.3.009 and later, urging users to upgrade to mitigate the risk. No public exploits or active exploitation in the wild have been reported to date. The vulnerability highlights the importance of securing physical access to network infrastructure devices and ensuring timely patching of firmware to prevent privilege escalation through communication channel manipulation.

Potential Impact

The primary impact of CVE-2025-62843 is unauthorized privilege escalation on affected QuRouter devices when an attacker has physical access. This could allow the attacker to intercept, manipulate, or redirect communications intended for legitimate endpoints, potentially compromising device integrity and confidentiality. However, since the vulnerability requires physical access and does not allow remote exploitation, the risk is limited to environments where attackers can physically interact with the device, such as unsecured offices or data centers. Organizations relying on QuRouter devices for critical network routing or security functions may face localized risks of device compromise, leading to potential network disruptions or data exposure. The low CVSS score reflects the limited scope and difficulty of exploitation, but the impact on confidentiality and integrity at the device level remains a concern. No availability impact or widespread exploitation has been reported. Overall, the threat is moderate for organizations with physical security weaknesses but low for those with strong physical controls.

Mitigation Recommendations

To mitigate CVE-2025-62843, organizations should: 1) Immediately update all affected QuRouter devices to version 2.6.3.009 or later, where the vulnerability is patched. 2) Enforce strict physical security controls around network infrastructure to prevent unauthorized physical access, including locked server rooms, restricted access policies, and surveillance. 3) Regularly audit device firmware versions and configurations to ensure compliance with security best practices. 4) Implement network segmentation to limit the impact of any compromised device. 5) Monitor network traffic for unusual patterns that could indicate exploitation attempts. 6) Educate staff on the importance of physical security and reporting suspicious activity. 7) Consider additional device hardening measures such as disabling unused ports and services to reduce attack surface. These steps go beyond generic advice by emphasizing physical security and proactive patch management tailored to the nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2025-10-24T02:43:45.372Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bdbd93e2bf98efc48d0f57

Added to database: 3/20/2026, 9:35:15 PM

Last enriched: 3/20/2026, 9:37:42 PM

Last updated: 3/21/2026, 3:33:15 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses