CVE-2025-50398: n/a
Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter fac_password.
AI Analysis
Technical Summary
CVE-2025-50398 identifies a buffer overflow vulnerability in the Mercury D196G device firmware version d196gv1-cn-up_2020-01-09_11.21.44. The flaw exists in the function sub_404CAEDC, which processes the fac_password parameter. Buffer overflow vulnerabilities occur when input data exceeds the allocated buffer size, leading to memory corruption. This can allow attackers to overwrite critical memory regions, potentially enabling arbitrary code execution or causing the device to crash, resulting in denial of service. The vulnerability does not currently have a CVSS score or known exploits in the wild, indicating it may be newly discovered or not yet weaponized. The lack of patch links suggests that no official fix has been released, increasing the urgency for defensive measures. The Mercury D196G device is often used in industrial or networked environments, where such a vulnerability could be exploited remotely if the fac_password parameter is accessible over the network. Exploitation likely does not require authentication, given the nature of buffer overflows in input parameters, increasing the attack surface. The vulnerability's impact includes potential compromise of device integrity, confidentiality (if code execution is achieved), and availability due to crashes. Without mitigation, attackers could leverage this flaw to disrupt operations or gain footholds in critical systems.
Potential Impact
For European organizations, the vulnerability poses significant risks, particularly for those deploying Mercury D196G devices in critical infrastructure sectors such as energy, manufacturing, or telecommunications. Exploitation could lead to unauthorized control over affected devices, enabling attackers to disrupt services, manipulate data, or pivot into broader network environments. The potential for denial of service could impact operational continuity, causing downtime and financial losses. Confidentiality breaches could occur if attackers execute arbitrary code to extract sensitive information. Given the absence of patches, organizations face increased exposure until mitigations are implemented. The impact is heightened in environments where these devices are integral to safety or operational processes. Additionally, regulatory compliance frameworks in Europe, such as NIS2, emphasize the protection of critical infrastructure, making exploitation of this vulnerability a compliance risk. The lack of known exploits may reduce immediate risk but also means organizations should proactively address the vulnerability before it is weaponized.
Mitigation Recommendations
Since no official patches or firmware updates are currently available, European organizations should implement network-level mitigations to reduce exposure. These include restricting access to the Mercury D196G devices by implementing strict firewall rules and network segmentation to isolate vulnerable devices from untrusted networks. Input validation or filtering at the network perimeter could help block malicious payloads targeting the fac_password parameter. Monitoring network traffic for anomalous patterns related to this parameter may provide early detection of exploitation attempts. Organizations should engage with the device vendor to obtain timelines for patches or firmware updates and apply them promptly once available. Additionally, conducting vulnerability scans and penetration tests focused on this device can help identify exposure. Maintaining up-to-date asset inventories to track affected devices is critical. Finally, implementing incident response plans tailored to potential device compromise scenarios will improve readiness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-50398: n/a
Description
Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter fac_password.
AI-Powered Analysis
Technical Analysis
CVE-2025-50398 identifies a buffer overflow vulnerability in the Mercury D196G device firmware version d196gv1-cn-up_2020-01-09_11.21.44. The flaw exists in the function sub_404CAEDC, which processes the fac_password parameter. Buffer overflow vulnerabilities occur when input data exceeds the allocated buffer size, leading to memory corruption. This can allow attackers to overwrite critical memory regions, potentially enabling arbitrary code execution or causing the device to crash, resulting in denial of service. The vulnerability does not currently have a CVSS score or known exploits in the wild, indicating it may be newly discovered or not yet weaponized. The lack of patch links suggests that no official fix has been released, increasing the urgency for defensive measures. The Mercury D196G device is often used in industrial or networked environments, where such a vulnerability could be exploited remotely if the fac_password parameter is accessible over the network. Exploitation likely does not require authentication, given the nature of buffer overflows in input parameters, increasing the attack surface. The vulnerability's impact includes potential compromise of device integrity, confidentiality (if code execution is achieved), and availability due to crashes. Without mitigation, attackers could leverage this flaw to disrupt operations or gain footholds in critical systems.
Potential Impact
For European organizations, the vulnerability poses significant risks, particularly for those deploying Mercury D196G devices in critical infrastructure sectors such as energy, manufacturing, or telecommunications. Exploitation could lead to unauthorized control over affected devices, enabling attackers to disrupt services, manipulate data, or pivot into broader network environments. The potential for denial of service could impact operational continuity, causing downtime and financial losses. Confidentiality breaches could occur if attackers execute arbitrary code to extract sensitive information. Given the absence of patches, organizations face increased exposure until mitigations are implemented. The impact is heightened in environments where these devices are integral to safety or operational processes. Additionally, regulatory compliance frameworks in Europe, such as NIS2, emphasize the protection of critical infrastructure, making exploitation of this vulnerability a compliance risk. The lack of known exploits may reduce immediate risk but also means organizations should proactively address the vulnerability before it is weaponized.
Mitigation Recommendations
Since no official patches or firmware updates are currently available, European organizations should implement network-level mitigations to reduce exposure. These include restricting access to the Mercury D196G devices by implementing strict firewall rules and network segmentation to isolate vulnerable devices from untrusted networks. Input validation or filtering at the network perimeter could help block malicious payloads targeting the fac_password parameter. Monitoring network traffic for anomalous patterns related to this parameter may provide early detection of exploitation attempts. Organizations should engage with the device vendor to obtain timelines for patches or firmware updates and apply them promptly once available. Additionally, conducting vulnerability scans and penetration tests focused on this device can help identify exposure. Maintaining up-to-date asset inventories to track affected devices is critical. Finally, implementing incident response plans tailored to potential device compromise scenarios will improve readiness.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694190eb9050fe8508040784
Added to database: 12/16/2025, 5:03:39 PM
Last enriched: 12/16/2025, 5:18:46 PM
Last updated: 12/16/2025, 10:17:01 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68274: CWE-476: NULL Pointer Dereference in emiago sipgo
HighCVE-2025-64520: CWE-862: Missing Authorization in glpi-project glpi
MediumCVE-2025-14466: CWE-770 Allocation of Resources Without Limits or Throttling in Güralp Systems Fortimus Series
MediumCVE-2025-0852
LowCVE-2023-27561: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.