QNAP Fixes Critical Flaws Exposed by Pwn2Own Contest Winners
Qnap Addresses Multiple Vulnerabilities Across Its Products
The Taiwanese company has released patches for four security defects discovered during the Pwn2Own Ireland hacking contest in October 2025. The vulnerabilities, designated as CVE-2025-62843 to CVE-2025-62846, affect QNap’s SD-WAN routers and were fixed in QuRouter version 2.6.3.009.
Vulnerability Details
- CVE-2025-62843: An attacker can gain specific privileges by exploiting this issue through physical access to a vulnerable device.
- CVE-2025-62844: An attacker can obtain sensitive information by exploiting this issue over the local network.
- CVE-2025-62845: An attacker with administrative privileges can cause unexpected device behavior or execute unauthorized code or commands.
- CVE-2025-62846: This vulnerability was successfully exploited by Team DDOS during the Pwn2Own contest and allowed them to execute unauthorized code or commands.
Additional Security Updates
In addition to resolving the Pwn2Own-related issues, the patches also address several other vulnerabilities in QuNetSwitch, including:
- A potential vulnerability that could lead to arbitrary code execution.
- A hardcoded credential vulnerability that could grant unauthorized access.
- A vulnerability that could allow arbitrary command execution.
Furthermore, QNAP has addressed medium-severity vulnerabilities in Media Streaming Add-on and QuFTP Service that could lead to crashes or data leaks. Although QNAP does not indicate that any of these vulnerabilities have been exploited in the wild, the patches are still essential to ensure the continued security and stability of affected systems.
