Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10392: Stack-based Buffer Overflow in Mercury KM08-708H GiGA WiFi Wave2

0
Critical
VulnerabilityCVE-2025-10392cvecve-2025-10392
Published: Sun Sep 14 2025 (09/14/2025, 05:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Mercury
Product: KM08-708H GiGA WiFi Wave2

Description

A vulnerability was detected in Mercury KM08-708H GiGA WiFi Wave2 1.1.14. This affects an unknown function of the component HTTP Header Handler. The manipulation of the argument Host results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 09/22/2025, 00:39:17 UTC

Technical Analysis

CVE-2025-10392 is a critical security vulnerability identified in the Mercury KM08-708H GiGA WiFi Wave2 router, specifically version 1.1.14. The flaw exists within the HTTP Header Handler component, where improper handling of the 'Host' argument leads to a stack-based buffer overflow. This vulnerability can be exploited remotely without requiring any authentication or user interaction, making it highly accessible to attackers. The buffer overflow occurs when the attacker crafts a malicious HTTP request with a manipulated Host header, causing the device to overwrite parts of the stack memory. This can lead to arbitrary code execution, potentially allowing an attacker to take full control of the affected device, disrupt network operations, or pivot to other internal systems. The CVSS 4.0 base score of 9.3 reflects the critical nature of this vulnerability, highlighting its high impact on confidentiality, integrity, and availability, combined with ease of exploitation. Although no public exploits have been observed in the wild yet, the exploit code is publicly available, increasing the risk of imminent attacks. The absence of a patch or mitigation from the vendor at the time of publication further exacerbates the threat landscape for users of this device.

Potential Impact

For European organizations, the exploitation of this vulnerability could have severe consequences. The Mercury KM08-708H GiGA WiFi Wave2 is used in various enterprise and possibly critical infrastructure networks for wireless connectivity. Successful exploitation could lead to unauthorized access to internal networks, data breaches, disruption of business operations, and potential lateral movement within corporate environments. This is particularly concerning for sectors with high reliance on secure and stable network infrastructure, such as finance, healthcare, government, and telecommunications. The ability to remotely execute code without authentication means attackers can launch attacks at scale, potentially targeting multiple organizations simultaneously. Additionally, compromised routers can be used as entry points for espionage or ransomware campaigns, amplifying the impact on confidentiality and availability of sensitive information and services.

Mitigation Recommendations

Given the critical nature of CVE-2025-10392 and the lack of an official patch, European organizations should implement immediate compensating controls. These include isolating affected devices from the internet and untrusted networks, restricting management interfaces to trusted IP addresses only, and deploying network-level protections such as Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) configured to detect and block malformed HTTP Host headers. Network segmentation should be enforced to limit the potential spread of an attacker who compromises a device. Monitoring network traffic for unusual patterns or spikes in HTTP requests with suspicious Host headers can provide early detection. Organizations should also engage with the vendor for updates and apply patches as soon as they become available. In parallel, conducting an inventory of all Mercury KM08-708H devices and upgrading firmware to unaffected versions or replacing vulnerable hardware should be prioritized. Finally, incident response plans should be updated to address potential exploitation scenarios related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T09:48:46.725Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c7591939776bc2a1466a76

Added to database: 9/15/2025, 12:08:57 AM

Last enriched: 9/22/2025, 12:39:17 AM

Last updated: 10/30/2025, 2:13:09 PM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats