Skip to main content

CVE-2025-10392: Stack-based Buffer Overflow in Mercury KM08-708H GiGA WiFi Wave2

Critical
VulnerabilityCVE-2025-10392cvecve-2025-10392
Published: Sun Sep 14 2025 (09/14/2025, 05:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Mercury
Product: KM08-708H GiGA WiFi Wave2

Description

A vulnerability was detected in Mercury KM08-708H GiGA WiFi Wave2 1.1.14. This affects an unknown function of the component HTTP Header Handler. The manipulation of the argument Host results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/15/2025, 00:10:51 UTC

Technical Analysis

CVE-2025-10392 is a critical stack-based buffer overflow vulnerability identified in the Mercury KM08-708H GiGA WiFi Wave2 device, specifically in version 1.1.14. The flaw resides in the HTTP Header Handler component, where improper handling of the 'Host' argument allows an attacker to overflow the stack buffer. This vulnerability can be exploited remotely without requiring authentication or user interaction, making it highly dangerous. The overflow can lead to arbitrary code execution, potentially allowing an attacker to take full control of the affected device. The CVSS 4.0 base score is 9.3, reflecting the critical nature of this vulnerability with high impact on confidentiality, integrity, and availability. The exploit code is publicly available, increasing the risk of widespread attacks. Although no known exploits in the wild have been reported yet, the public availability of the exploit significantly raises the threat level. The vulnerability affects a networking device commonly used to provide WiFi connectivity, which is often deployed in enterprise and small-to-medium business environments. The lack of a patch link indicates that a fix may not yet be available, emphasizing the urgency for mitigation and monitoring.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Mercury KM08-708H GiGA WiFi Wave2 devices for network connectivity. Successful exploitation could lead to complete compromise of the device, enabling attackers to intercept, manipulate, or disrupt network traffic. This could result in data breaches, unauthorized access to internal networks, and potential lateral movement within corporate environments. Given the device's role in WiFi infrastructure, availability disruptions could impact business operations and productivity. The critical severity and remote exploitability without authentication mean that attackers can target these devices en masse, potentially affecting large numbers of organizations. Sensitive sectors such as finance, healthcare, and government institutions in Europe could face heightened risks due to the potential exposure of confidential data and critical services. Additionally, the public exploit availability increases the likelihood of opportunistic attacks and automated scanning campaigns targeting vulnerable devices.

Mitigation Recommendations

Immediate mitigation steps include isolating affected Mercury KM08-708H GiGA WiFi Wave2 devices from critical network segments to limit exposure. Network administrators should implement strict ingress filtering to block malicious HTTP Host header payloads and monitor network traffic for anomalous patterns indicative of exploitation attempts. Deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures targeting this vulnerability can help detect and block attacks. Organizations should engage with Mercury or authorized vendors to obtain firmware updates or patches as soon as they become available. Until a patch is released, consider replacing vulnerable devices with alternative hardware or disabling HTTP management interfaces if feasible. Regularly audit and inventory network devices to identify all instances of the affected product version. Additionally, implement network segmentation and zero-trust principles to minimize the impact of a compromised device. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential breaches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T09:48:46.725Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c7591939776bc2a1466a76

Added to database: 9/15/2025, 12:08:57 AM

Last enriched: 9/15/2025, 12:10:51 AM

Last updated: 9/15/2025, 6:54:44 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats