Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
QNAP Resolves Flaws Revealed at Pwn2Own 2025

QNAP Resolves Flaws Revealed at Pwn2Own 2025

Posted on March 23, 2026 By CWS

QNAP has swiftly acted to mitigate several security vulnerabilities discovered in its products, following their exposure at the Pwn2Own Ireland hacking competition in October 2025. The company released patches last Friday addressing four significant vulnerabilities that were exploited during the event.

Details of the Vulnerabilities

The identified vulnerabilities, cataloged from CVE-2025-62843 to CVE-2025-62846, impact QNAP’s SD-WAN routers. These issues have been rectified in the updated QuRouter version 2.6.3.009. According to QNAP’s advisory, the first vulnerability necessitates physical access to the device to gain certain privileges, whereas the second can be exploited via the local network to access sensitive data.

The remaining vulnerabilities allow attackers with administrative rights to disrupt device behavior or execute unauthorized commands. The vulnerabilities were initially demonstrated by Team DDOS at Pwn2Own 2025, where they managed to chain multiple security flaws in QNAP routers and NAS devices, earning a $100,000 prize for their efforts.

QNAP’s Response and Additional Patches

In less than three weeks post-competition, QNAP released fixes for two of the demonstrated flaws, specifically CVE-2025-62840 and CVE-2025-62842. Additionally, the company addressed further vulnerabilities identified during the contest by other participants.

QNAP also issued patches for four critical vulnerabilities within its QuNetSwitch software. These issues could potentially lead to arbitrary code execution and unauthorized access through hardcoded credentials. Users are strongly encouraged to update to QuNetSwitch versions 2.0.4.0415 or 2.0.5.0906 and beyond.

Addressing Broader Security Concerns

Another significant vulnerability, involving missing authentication in QVR Pro, was also addressed. This flaw could have permitted remote attackers to infiltrate vulnerable systems. The release of QVR Pro version 2.7.4.1485 aims to resolve this issue.

Furthermore, QNAP tackled medium-severity vulnerabilities in both the Media Streaming Add-on and QuFTP Service, which had the potential to cause system crashes or data breaches. Importantly, QNAP has noted that none of these vulnerabilities have been reported as exploited in the wild. Detailed information can be accessed via the company’s security advisories page.

For users of QNAP products, it is crucial to ensure systems are updated to the latest versions to safeguard against these vulnerabilities.

Security Week News Tags:CVE, Cybersecurity, NAS, Patch, Pwn2Own, QNAP, Router, Security, Software Security, Update, Vulnerabilities

Post navigation

Previous Post: Microsoft Alerts on IRS Phishing Amid Tax Season
Next Post: Urgent Alert: Craft CMS Vulnerability Under Attack

Related Posts

QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability Security Week News
Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions Nevada Confirms Ransomware Attack Behind Statewide Service Disruptions Security Week News
Hackers Win 0,000 on First Day of Pwn2Own Berlin 2025 Hackers Win $260,000 on First Day of Pwn2Own Berlin 2025 Security Week News
Hackers Exploit Sitecore Zero-Day for Malware Delivery Hackers Exploit Sitecore Zero-Day for Malware Delivery Security Week News
SIM Farm Dismantled in Europe, Seven Arrested SIM Farm Dismantled in Europe, Seven Arrested Security Week News
Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue
  • Hackers Exploit Logitech Installer for Banking Trojan
  • Hackers Exploit Fake OpenClaw Installer to Steal Data
  • Modular RAT Targets Southeast Asia with Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NVIDIA Data Breach Exposes GeForce Users’ Personal Info
  • Let’s Encrypt Temporarily Stops Certificate Issuance After Issue
  • Hackers Exploit Logitech Installer for Banking Trojan
  • Hackers Exploit Fake OpenClaw Installer to Steal Data
  • Modular RAT Targets Southeast Asia with Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark