VulnerabilitiesHIGH

QNAP Patches Vulnerabilities Exploited at Pwn2Own Contest

SWSecurityWeek·Reporting by Ionut Arghire
📰 2 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, QNAP fixed four security holes that hackers used in a competition.

Quick Summary

QNAP has patched four vulnerabilities exploited during the Pwn2Own hacking contest. These flaws could allow attackers to execute unauthorized code. Users must update their devices to protect against potential exploits. This is critical for maintaining device security.

The Flaw

In a recent announcement, QNAP revealed patches for four significant vulnerabilities discovered during the Pwn2Own hacking contest in October 2025. These flaws, tracked as CVE-2025-62843 to CVE-2025-62846, primarily affect the company's SD-WAN routers. The vulnerabilities allow attackers to gain unauthorized access, execute malicious code, or cause unexpected behavior in the devices. The first vulnerability requires physical access to exploit, while the second can be targeted over the local network to access sensitive information.

The last two vulnerabilities are particularly concerning as they can be exploited by attackers with administrative privileges. These flaws enable unauthorized code execution and can lead to unexpected device behavior. The Team DDOS, which demonstrated these exploits at the contest, successfully chained multiple bugs to gain root privileges, earning a whopping $100,000 for their efforts.

What's at Risk

The implications of these vulnerabilities are significant. If left unpatched, they could allow attackers to gain control over vulnerable devices, leading to potential data breaches or service disruptions. The ability to execute unauthorized commands poses a severe risk to organizations relying on QNAP's technology for their networking needs. As these vulnerabilities were demonstrated in a high-profile hacking contest, it raises concerns about their potential exploitation in the wild.

QNAP has urged users to update their devices to the latest versions to mitigate these risks. The patches not only address the vulnerabilities demonstrated at Pwn2Own but also include fixes for other critical issues in their product lineup, such as QuNetSwitch and QVR Pro.

Patch Status

QNAP has rolled out updates for the affected products, including QuRouter version 2.6.3.009 and QuNetSwitch versions 2.0.4.0415 and 2.0.5.0906. These updates are crucial as they resolve the vulnerabilities that could lead to arbitrary code execution and unauthorized access. Users are strongly advised to implement these patches as soon as possible to safeguard their devices against potential attacks.

In addition to the patches for the vulnerabilities exploited at Pwn2Own, QNAP has addressed medium-severity vulnerabilities in other products, such as the Media Streaming Add-on and QuFTP Service. While these vulnerabilities do not carry the same level of risk, they can still lead to crashes or data leaks if not addressed.

Immediate Actions

To protect your systems, take the following steps:

  • Update your QNAP devices to the latest firmware versions immediately.
  • Monitor your network for any unusual activity that could indicate an attempted exploit.
  • Review your security policies to ensure that they account for the risks associated with these vulnerabilities.

By staying proactive and implementing these updates, users can significantly reduce their risk of falling victim to potential exploits stemming from these vulnerabilities. The swift action taken by QNAP in addressing these issues highlights the importance of maintaining robust security practices in the face of evolving threats.

🔒 Pro insight: The rapid patching following Pwn2Own highlights the need for organizations to prioritize timely updates to mitigate exploitation risks.

Original article from

SWSecurityWeek· Ionut Arghire
Read Full Article

Also covered by

SESecurity Affairs

QNAP fixed four vulnerabilities demonstrated at Pwn2Own Ireland 2025

Read Article
CYCyber Security News

Critical QNAP QVR Pro Vulnerability Let Remote Attackers Gain Access to the System

Read Article

Related Pings

CRITICALVulnerabilities

Fortinet FortiClient EMS - Critical 0-Day Vulnerability Exploited

A critical zero-day vulnerability in FortiClient EMS is actively exploited. Fortinet has released emergency patches and urges immediate action from users.

Cyber Security News·
HIGHVulnerabilities

Video Conferencing Bug - CISA Orders Agencies to Patch

A serious vulnerability in TrueConf video conferencing software is being exploited by Chinese hackers. CISA has mandated a two-week patch deadline for federal agencies. Immediate action is essential to safeguard sensitive data and communications.

The Record·
HIGHVulnerabilities

Post-Deployment Vulnerability Detection - Rethinking Strategies

A new approach to vulnerability detection is needed post-deployment. Many organizations overlook risks from newly disclosed CVEs, leaving systems exposed. Rethinking strategies can enhance security.

OpenSSF Blog·
HIGHVulnerabilities

Mobile Vulnerabilities - Enterprises Struggle with Control

Mobile devices are increasingly vulnerable due to outdated software and hidden threats like Shadow AI. This puts sensitive enterprise data at risk. Organizations must act to secure their mobile environments.

SecurityWeek·
HIGHVulnerabilities

CVE-2026-33691 - OWASP CRS Whitespace Padding Bypass Alert

A new vulnerability in OWASP CRS allows attackers to upload dangerous files by exploiting whitespace in filenames. This affects many web applications, risking severe security breaches. Immediate updates are necessary to protect your systems.

Full Disclosure·
HIGHVulnerabilities

MetInfo CMS Vulnerability - PHP Code Injection Risk

A critical vulnerability in MetInfo CMS could let attackers execute arbitrary PHP code. Versions 7.9, 8.0, and 8.1 are at risk. Stay alert for updates and potential fixes.

Full Disclosure·