EUVD-2025-208897

| CVE-2025-62844 MEDIUM
2026-03-20 qnap
4.0
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None

Lifecycle Timeline

3
EUVD ID Assigned
Mar 20, 2026 - 16:30 euvd
EUVD-2025-208897
Analysis Generated
Mar 20, 2026 - 16:30 vuln.today
CVE Published
Mar 20, 2026 - 16:21 nvd
MEDIUM 4.0

Description

A weak authentication vulnerability has been reported to affect QHora. If an attacker gains local network access, they can then exploit the vulnerability to gain sensitive information. We have already fixed the vulnerability in the following version: QuRouter 2.6.2.007 and later

Analysis

A weak authentication vulnerability exists in QNAP QHora/QuRouter devices that allows attackers with local network access to bypass authentication mechanisms and disclose sensitive information. The vulnerability affects QuRouter versions prior to 2.6.2.007, and exploitation requires network-level access but no special privileges. While no CVSS score or EPSS data is publicly available, the classification as CWE-1390 (Weak Authentication) and the emphasis on local network access indicates this is a network-adjacent threat with moderate real-world risk, particularly in environments where untrusted devices can connect to the local network.

Technical Context

This vulnerability is rooted in CWE-1390 (Weak Authentication), which encompasses failures in authentication mechanisms such as insufficient credential validation, predictable authentication tokens, or logic flaws in access control. In the context of QNAP QuRouter (CPE: cpe:2.3:a:qnap_systems_inc.:qurouter:*:*:*:*:*:*:*:*), the affected product is a network routing appliance that manages network traffic and connectivity. The weakness appears to stem from inadequate authentication enforcement at the application or API level, allowing attackers on the same network segment to extract sensitive configuration or operational data without proper credentials. The fix in version 2.6.2.007 and later suggests the vendor implemented stronger authentication mechanisms, likely including improved token handling, stricter credential validation, or enhanced access control enforcement.

Affected Products

QNAP QuRouter devices running versions prior to 2.6.2.007 are affected, as confirmed by CPE cpe:2.3:a:qnap_systems_inc.:qurouter:*:*:*:*:*:*:*:*. The vendor security advisory QSA-26-12 published on QNAP's security advisory page confirms that QuRouter 2.6.2.007 and all subsequent versions contain the fix. Organizations running any QuRouter firmware version before 2.6.2.007 should consider their deployment at risk, particularly if the device is deployed in environments with untrusted network participants.

Remediation

Upgrade QNAP QuRouter to firmware version 2.6.2.007 or later immediately. Visit the official QNAP security advisory at https://www.qnap.com/en/security-advisory/qsa-26-12 for patch download links and detailed upgrade instructions. As an interim control, restrict local network access to the QuRouter's management interface by implementing network segmentation—isolate the device on a dedicated management VLAN with access only from authorized administrative systems and block untrusted devices from reaching the management ports. Additionally, disable any unnecessary services or APIs on the QuRouter and ensure strong, unique administrative credentials are in use. After patching, verify the update completed successfully and monitor device logs for any exploitation attempts.

Priority Score

20
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +20
POC: 0

Share

EUVD-2025-208897 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy