Impact
An improper restriction of the communication channel has been reported in QNAP’s QuRouter routers. The flaw allows an attacker with physical access to impersonate the router’s intended communication endpoint, sending malicious commands that the device treats as legitimate. This leads to the attacker gaining the same privileges that would normally be granted to the intended endpoint.
Affected Systems
QNAP Systems Inc. routers running QuRouter firmware versions 2.6.0.239 through 2.6.2.007 are affected. Users of these builds are vulnerable and should update if possible.
Risk and Exploitability
The CVSS score of 0.9 indicates low severity, and the EPSS score is below 1%, implying a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires physical proximity to the device to send traffic on its privileged communication channels, making it a local, targeted attack that can grant the attacker elevated privileges.
OpenCVE Enrichment