SB2026032341 - Multiple vulnerabilities in QNAP QuRouter



SB2026032341 - Multiple vulnerabilities in QNAP QuRouter

Published: March 23, 2026

Security Bulletin ID SB2026032341
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

Medium 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Improper restriction of communication channel to intended endpoints (CVE-ID: CVE-2025-62843)

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to improper restriction of communication channel to intended endpoints. An attacker with physical access can gain elevated privileges on the target system.


2) Weak Authentication (CVE-ID: CVE-2025-62844)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to the weak authentication. A remote attacker on the local network can bypass authentication process and gain unauthorized access to the application.


3) SQL injection (CVE-ID: CVE-2025-62846)

The vulnerability allows a local user to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A local administrator can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


4) Improper Neutralization of Escape, Meta, or Control Sequences (CVE-ID: CVE-2025-62845)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to improper neutralization of escape, meta, or control sequences. A local administrator can execute arbitrary code on the target system.


Remediation

Install update from vendor's website.