CVE-2025-62846: CWE-89 in QNAP Systems Inc. QuRouter
An SQL injection vulnerability has been reported to affect QHora. If a local attacker gains an administrator account, they can then exploit the vulnerability to execute unauthorized code or commands. We have already fixed the vulnerability in the following version: QuRouter 2.6.2.007 and later
AI Analysis
Technical Summary
CVE-2025-62846 is an SQL injection vulnerability categorized under CWE-89, impacting QNAP Systems Inc.'s QuRouter product, specifically versions 2.6.x. The vulnerability arises from insufficient sanitization of SQL inputs within the device's management interface or backend, allowing a local attacker with administrator privileges to inject malicious SQL commands. Exploiting this flaw enables unauthorized code or command execution, potentially leading to full system compromise, data leakage, or disruption of network services. The vulnerability requires local access with elevated privileges but does not require additional authentication or user interaction. The CVSS 4.0 base score is 7.3 (high), reflecting the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for user interaction. The vendor has addressed this issue in QuRouter version 2.6.2.007 and later. No public exploits have been reported to date, but the vulnerability poses a significant risk in environments where attackers can gain administrative access to the device. Given the critical role of QuRouter devices in network infrastructure, exploitation could facilitate lateral movement, data exfiltration, or persistent access within targeted networks.
Potential Impact
The impact of CVE-2025-62846 is substantial for organizations deploying affected QuRouter versions. Successful exploitation can lead to unauthorized code execution, compromising the confidentiality, integrity, and availability of the device and potentially the broader network. Attackers with admin access could manipulate routing configurations, intercept or redirect traffic, deploy malware, or create persistent backdoors. This could disrupt business operations, lead to data breaches, or facilitate further attacks within the network. The requirement for local admin access limits remote exploitation but does not eliminate risk, as attackers often seek to escalate privileges or gain local access through other means. Organizations relying on QuRouter devices for critical network functions are at risk of operational disruption and data compromise if the vulnerability is not remediated promptly.
Mitigation Recommendations
To mitigate CVE-2025-62846, organizations should immediately upgrade all affected QuRouter devices to version 2.6.2.007 or later, where the vulnerability has been patched. Beyond patching, restrict administrative access to trusted personnel and secure local access points to prevent unauthorized physical or network-based admin access. Implement network segmentation to isolate management interfaces from general user networks, reducing the attack surface. Enable and monitor detailed logging on QuRouter devices to detect unusual administrative activities that could indicate exploitation attempts. Regularly audit user accounts and privileges to ensure that only necessary personnel have administrative rights. Employ multi-factor authentication (MFA) for administrative access if supported by the device. Additionally, conduct periodic vulnerability assessments and penetration testing focused on network infrastructure devices to identify and remediate similar risks proactively.
Affected Countries
United States, Germany, Japan, South Korea, China, United Kingdom, Canada, Australia, France, Netherlands
CVE-2025-62846: CWE-89 in QNAP Systems Inc. QuRouter
Description
An SQL injection vulnerability has been reported to affect QHora. If a local attacker gains an administrator account, they can then exploit the vulnerability to execute unauthorized code or commands. We have already fixed the vulnerability in the following version: QuRouter 2.6.2.007 and later
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-62846 is an SQL injection vulnerability categorized under CWE-89, impacting QNAP Systems Inc.'s QuRouter product, specifically versions 2.6.x. The vulnerability arises from insufficient sanitization of SQL inputs within the device's management interface or backend, allowing a local attacker with administrator privileges to inject malicious SQL commands. Exploiting this flaw enables unauthorized code or command execution, potentially leading to full system compromise, data leakage, or disruption of network services. The vulnerability requires local access with elevated privileges but does not require additional authentication or user interaction. The CVSS 4.0 base score is 7.3 (high), reflecting the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for user interaction. The vendor has addressed this issue in QuRouter version 2.6.2.007 and later. No public exploits have been reported to date, but the vulnerability poses a significant risk in environments where attackers can gain administrative access to the device. Given the critical role of QuRouter devices in network infrastructure, exploitation could facilitate lateral movement, data exfiltration, or persistent access within targeted networks.
Potential Impact
The impact of CVE-2025-62846 is substantial for organizations deploying affected QuRouter versions. Successful exploitation can lead to unauthorized code execution, compromising the confidentiality, integrity, and availability of the device and potentially the broader network. Attackers with admin access could manipulate routing configurations, intercept or redirect traffic, deploy malware, or create persistent backdoors. This could disrupt business operations, lead to data breaches, or facilitate further attacks within the network. The requirement for local admin access limits remote exploitation but does not eliminate risk, as attackers often seek to escalate privileges or gain local access through other means. Organizations relying on QuRouter devices for critical network functions are at risk of operational disruption and data compromise if the vulnerability is not remediated promptly.
Mitigation Recommendations
To mitigate CVE-2025-62846, organizations should immediately upgrade all affected QuRouter devices to version 2.6.2.007 or later, where the vulnerability has been patched. Beyond patching, restrict administrative access to trusted personnel and secure local access points to prevent unauthorized physical or network-based admin access. Implement network segmentation to isolate management interfaces from general user networks, reducing the attack surface. Enable and monitor detailed logging on QuRouter devices to detect unusual administrative activities that could indicate exploitation attempts. Regularly audit user accounts and privileges to ensure that only necessary personnel have administrative rights. Employ multi-factor authentication (MFA) for administrative access if supported by the device. Additionally, conduct periodic vulnerability assessments and penetration testing focused on network infrastructure devices to identify and remediate similar risks proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- qnap
- Date Reserved
- 2025-10-24T02:43:45.372Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bdbd93e2bf98efc48d0f60
Added to database: 3/20/2026, 9:35:15 PM
Last enriched: 3/20/2026, 9:38:23 PM
Last updated: 3/21/2026, 1:50:21 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.