安全ID : QSA-26-12
Multiple Vulnerabilities in QuRouter (PWN2OWN 2025)
发布日期 : March 21, 2026
通用漏洞披露 : CVE-2025-62843 | ZDI-CAN-28371 | CVE-2025-62844 | ZDI-CAN-28422 | CVE-2025-62846 | ZDI-CAN-28424 | CVE-2025-62845 | ZDI-CAN-28423
受影响产品: QuRouter 2.6.x
严重程度
严重
状态
已解决
Summary
Multiple vulnerabilities have been reported to affect QHora.
- CVE-2025-62843: If an attacker gains physical access, they can then exploit the improper restriction of communication channel to intended endpoints vulnerability to gain the privileges that were intended for the original endpoint.
- CVE-2025-62844: If an attacker gains local network access, they can then exploit the weak authentication vulnerability to gain sensitive information.
- CVE-2025-62846: If a local attacker gains an administrator account, they can then exploit the SQL injection vulnerability to execute unauthorized code or commands.
- CVE-2025-62845: If a local attacker gains an administrator account, they can then exploit the improper neutralization of escape, meta, or control sequences vulnerability to cause unexpected behavior.
We have already fixed these vulnerabilities in the following version:
| Affected Product | Fixed Version |
| QuRouter 2.6.x | QuRouter 2.6.3.009 and later |
Recommendation
For optimal security and performance, we recommend regularly updating QuRouter to the latest version, ensuring you receive all vulnerability fixes and new features. You can view the product support status to check for the latest updates available for your model.
Updating QuRouter
- Log in to QuRouter.
- Go to Firmware.
- Select Update now.
- Select Latest.
- Click Apply.
A confirmation message appears. - Click Apply.
QuRouter downloads and installs the latest firmware.
Tip: You can also download the latest firmware for your specific device from Download Center, and then perform a manual update in QuRouter by going to Firmware > Manual Update.
附件
致谢: Pwn2Own 2025 - Team DDOS
修订历史:
V1.0 (March 21, 2026) - Published