HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🔴 Critical🛡️ Vulnerability

Four Critical QNAP SD‑WAN Router Vulnerabilities (CVE‑2025‑62843‑62846) Demonstrated at Pwn2Own Ireland 2025, Now Patched

QNAP’s QuRouter SD‑WAN appliances were the target of a live Pwn2Own Ireland 2025 exploit chain, revealing four zero‑day bugs that allow privilege escalation, data access and system disruption. The vendor has released firmware 2.6.3.009 to remediate the issues, making immediate patching essential for third‑party risk management.

🛡️ LiveThreat™ Intelligence · 📅 March 24, 2026· 📰 securityaffairs.com
🔴
Severity
Critical
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
securityaffairs.com

Four Critical QNAP SD‑WAN Router Vulnerabilities (CVE‑2025‑62843‑62846) Demonstrated at Pwn2Own Ireland 2025, Now Patched

What It Is – QNAP disclosed four zero‑day flaws in its QuRouter SD‑WAN appliance that were publicly exploited by the Team DDOS researchers during Pwn2Own Ireland 2025. The bugs span privilege‑escalation, weak authentication, SQL‑injection and improper escape handling, allowing an attacker to gain root, read sensitive data or destabilise the device.

Exploitability – The vulnerabilities were fully chained in a live demonstration, confirming practical exploitability. No public malware is known, but the proof‑of‑concept exists. CVSS scores have not been published; the combination of remote code execution and data exposure warrants a Critical rating.

Affected Products – QNAP QuRouter firmware 2.6.3.009 (SD‑WAN routers) and associated QHora devices.

TPRM Impact – Organizations that rely on QNAP networking gear for branch connectivity, IoT gateways or backup transport face supply‑chain risk: an unpatched router can become a foothold for lateral movement, data exfiltration or service outage across the enterprise network.

Recommended Actions

  • Verify firmware version on every QNAP SD‑WAN device; upgrade immediately to 2.6.3.009 or later.
  • Conduct an inventory of all QNAP hardware (routers, QHora, QTS/QuTS‑hero nodes) used by third‑party vendors.
  • Segment SD‑WAN routers on dedicated VLANs and enforce strict firewall rules limiting inbound management traffic.
  • Monitor logs for unusual authentication attempts, SQL‑injection patterns or unexpected system reboots.
  • Review contracts with QNAP‑managed services to ensure they include timely patch‑management clauses.

Source: SecurityAffairs – QNAP fixed four vulnerabilities demonstrated at Pwn2Own Ireland 2025

📰 Original Source
https://securityaffairs.com/189871/security/qnap-fixed-four-vulnerabilities-demonstrated-at-pwn2own-ireland-2025.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.