{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T13:03:36.420","vulnerabilities":[{"cve":{"id":"CVE-2025-62843","sourceIdentifier":"security@qnapsecurity.com.tw","published":"2026-03-20T17:16:42.180","lastModified":"2026-04-14T14:19:26.883","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An improper restriction of communication channel to intended endpoints vulnerability has been reported to affect QHora. If an attacker gains physical access, they can then exploit the vulnerability to gain the privileges that were intended for the original endpoint.\n\nWe have already fixed the vulnerability in the following version:\nQuRouter 2.6.3.009 and later"},{"lang":"es","value":"Se ha informado de una vulnerabilidad de restricción inadecuada del canal de comunicación a los puntos finales previstos que afecta a QHora. Si un atacante obtiene acceso físico, puede entonces explotar la vulnerabilidad para obtener los privilegios que estaban destinados al punto final original.\n\nYa hemos corregido la vulnerabilidad en la siguiente versión:\nQuRouter 2.6.3.009 y posteriores"}],"metrics":{"cvssMetricV40":[{"source":"security@qnapsecurity.com.tw","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":0.9,"baseSeverity":"LOW","attackVector":"PHYSICAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"HIGH","subIntegrityImpact":"LOW","subAvailabilityImpact":"NONE","exploitMaturity":"UNREPORTED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@qnapsecurity.com.tw","type":"Primary","description":[{"lang":"en","value":"CWE-923"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qurouter:2.6.0.239:build_20250625:*:*:*:*:*:*","matchCriteriaId":"6BEA7459-EA28-4A5F-ABB4-F00661760FA4"},{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qurouter:2.6.0.688:build_20250818:*:*:*:*:*:*","matchCriteriaId":"71BB01EA-6A7B-46CF-A2F7-41DDBA5A17ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qurouter:2.6.1.028:build_20251001:*:*:*:*:*:*","matchCriteriaId":"F61A82A3-3A3E-42B6-B7F6-B5FAF37CCC80"},{"vulnerable":true,"criteria":"cpe:2.3:o:qnap:qurouter:2.6.2.007:build_20251027:*:*:*:*:*:*","matchCriteriaId":"DC28FAFD-B2EB-4DB5-B438-A439D4305A5F"}]}]}],"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-26-12","source":"security@qnapsecurity.com.tw","tags":["Vendor Advisory"]}]}}]}