CVE-2025-10385: Buffer Overflow in Mercury KM08-708H GiGA WiFi Wave2
A vulnerability has been found in Mercury KM08-708H GiGA WiFi Wave2 1.1. Affected by this issue is the function sub_450B2C of the file /goform/mcr_setSysAdm. The manipulation of the argument ChgUserId leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-10385 is a high-severity buffer overflow vulnerability identified in the Mercury KM08-708H GiGA WiFi Wave2 router, specifically affecting version 1.1 of the device firmware. The vulnerability resides in the function sub_450B2C within the /goform/mcr_setSysAdm file. It is triggered by the manipulation of the 'ChgUserId' argument, which leads to a buffer overflow condition. This flaw allows an attacker to remotely exploit the device without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability (all rated high in the CVSS vector), meaning an attacker could potentially execute arbitrary code, gain unauthorized access, or cause denial of service on the affected device. Although no known exploits are currently observed in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability's remote nature and low attack complexity make it a critical concern for network security, especially since routers like the KM08-708H serve as critical network infrastructure components. The absence of patches at the time of disclosure further elevates the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses significant risks. The Mercury KM08-708H GiGA WiFi Wave2 router is typically deployed in small to medium enterprise environments and possibly in residential settings that rely on robust WiFi connectivity. Exploitation could lead to unauthorized network access, interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within organizational networks. Given the router's role as a gateway device, compromise could undermine the security of connected devices and critical business operations. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe. The high severity and remote exploitability mean attackers could leverage this vulnerability to establish persistent footholds or launch broader attacks, including ransomware or espionage campaigns. Additionally, the lack of user interaction and authentication requirements lowers the barrier for attackers, increasing the likelihood of successful exploitation in diverse environments.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify the presence of Mercury KM08-708H GiGA WiFi Wave2 routers running firmware version 1.1. Until an official patch is released, network administrators should implement compensating controls such as restricting remote management access to trusted IP addresses or disabling remote administration features if not essential. Deploy network segmentation to isolate vulnerable devices from critical assets and monitor network traffic for anomalous activity targeting the /goform/mcr_setSysAdm endpoint. Employ intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts against this router. Regularly update firewall rules to block suspicious payloads and consider using VPNs or other secure channels for remote management. Once a vendor patch becomes available, prioritize immediate testing and deployment. Additionally, organizations should educate IT staff about this vulnerability and maintain heightened vigilance for related threat intelligence updates.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-10385: Buffer Overflow in Mercury KM08-708H GiGA WiFi Wave2
Description
A vulnerability has been found in Mercury KM08-708H GiGA WiFi Wave2 1.1. Affected by this issue is the function sub_450B2C of the file /goform/mcr_setSysAdm. The manipulation of the argument ChgUserId leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10385 is a high-severity buffer overflow vulnerability identified in the Mercury KM08-708H GiGA WiFi Wave2 router, specifically affecting version 1.1 of the device firmware. The vulnerability resides in the function sub_450B2C within the /goform/mcr_setSysAdm file. It is triggered by the manipulation of the 'ChgUserId' argument, which leads to a buffer overflow condition. This flaw allows an attacker to remotely exploit the device without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability (all rated high in the CVSS vector), meaning an attacker could potentially execute arbitrary code, gain unauthorized access, or cause denial of service on the affected device. Although no known exploits are currently observed in the wild, the exploit code has been publicly disclosed, increasing the risk of exploitation. The vulnerability's remote nature and low attack complexity make it a critical concern for network security, especially since routers like the KM08-708H serve as critical network infrastructure components. The absence of patches at the time of disclosure further elevates the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses significant risks. The Mercury KM08-708H GiGA WiFi Wave2 router is typically deployed in small to medium enterprise environments and possibly in residential settings that rely on robust WiFi connectivity. Exploitation could lead to unauthorized network access, interception or manipulation of sensitive data, disruption of network services, and potential lateral movement within organizational networks. Given the router's role as a gateway device, compromise could undermine the security of connected devices and critical business operations. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government institutions across Europe. The high severity and remote exploitability mean attackers could leverage this vulnerability to establish persistent footholds or launch broader attacks, including ransomware or espionage campaigns. Additionally, the lack of user interaction and authentication requirements lowers the barrier for attackers, increasing the likelihood of successful exploitation in diverse environments.
Mitigation Recommendations
Organizations should immediately inventory their network infrastructure to identify the presence of Mercury KM08-708H GiGA WiFi Wave2 routers running firmware version 1.1. Until an official patch is released, network administrators should implement compensating controls such as restricting remote management access to trusted IP addresses or disabling remote administration features if not essential. Deploy network segmentation to isolate vulnerable devices from critical assets and monitor network traffic for anomalous activity targeting the /goform/mcr_setSysAdm endpoint. Employ intrusion detection or prevention systems (IDS/IPS) with signatures or heuristics capable of detecting buffer overflow attempts against this router. Regularly update firewall rules to block suspicious payloads and consider using VPNs or other secure channels for remote management. Once a vendor patch becomes available, prioritize immediate testing and deployment. Additionally, organizations should educate IT staff about this vulnerability and maintain heightened vigilance for related threat intelligence updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-13T07:19:59.311Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c61721e14ebf9f5ccae6db
Added to database: 9/14/2025, 1:15:13 AM
Last enriched: 9/22/2025, 12:39:54 AM
Last updated: 10/29/2025, 9:29:03 AM
Views: 132
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownCVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.