CVE-2025-50398: n/a
Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter fac_password.
AI Analysis
Technical Summary
CVE-2025-50398 is a critical buffer overflow vulnerability identified in the Mercury D196G device firmware version d196gv1-cn-up_2020-01-09_11.21.44. The vulnerability exists in the function sub_404CAEDC, which processes the fac_password parameter. A buffer overflow occurs when this parameter is supplied with specially crafted input, allowing an attacker to overwrite memory and execute arbitrary code remotely without authentication or user interaction. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), which is a well-known category of memory corruption bugs that can lead to full system compromise. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). Although no patches or fixes have been released yet, the vulnerability poses a severe risk to any network-exposed Mercury D196G devices, potentially allowing attackers to gain control over the device, disrupt services, or pivot into internal networks. The absence of known exploits in the wild does not reduce the urgency, as the vulnerability is straightforward to exploit given the parameters. This vulnerability highlights the importance of secure coding practices and timely patch management in embedded device firmware.
Potential Impact
For European organizations, the impact of CVE-2025-50398 is significant, especially for those relying on Mercury D196G devices in their network infrastructure. Successful exploitation can lead to complete compromise of the affected device, resulting in unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within the network. This can affect sectors such as telecommunications, manufacturing, energy, and government agencies that may use these devices for network management or control. The critical nature of the vulnerability means attackers can cause denial of service or implant persistent malware, undermining operational continuity and data integrity. Given the lack of patches, organizations face heightened risk exposure, and any compromise could lead to regulatory penalties under GDPR if personal data is affected. The threat also increases the risk of espionage or sabotage in geopolitically sensitive environments within Europe.
Mitigation Recommendations
1. Immediately isolate Mercury D196G devices from untrusted networks, especially the internet, to prevent remote exploitation. 2. Disable or restrict access to the fac_password parameter interface if possible, or apply strict input validation controls at network boundaries. 3. Implement network segmentation to limit the impact of a compromised device and prevent lateral movement. 4. Monitor network traffic and device logs for unusual activity indicative of exploitation attempts, such as malformed packets targeting the fac_password parameter. 5. Engage with the device vendor or supplier to obtain firmware updates or patches as soon as they become available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. 7. Conduct regular security audits and penetration testing focusing on embedded devices and their management interfaces. 8. Prepare incident response plans specifically addressing potential exploitation of this vulnerability to enable rapid containment and recovery.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-50398: n/a
Description
Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter fac_password.
AI-Powered Analysis
Technical Analysis
CVE-2025-50398 is a critical buffer overflow vulnerability identified in the Mercury D196G device firmware version d196gv1-cn-up_2020-01-09_11.21.44. The vulnerability exists in the function sub_404CAEDC, which processes the fac_password parameter. A buffer overflow occurs when this parameter is supplied with specially crafted input, allowing an attacker to overwrite memory and execute arbitrary code remotely without authentication or user interaction. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), which is a well-known category of memory corruption bugs that can lead to full system compromise. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). Although no patches or fixes have been released yet, the vulnerability poses a severe risk to any network-exposed Mercury D196G devices, potentially allowing attackers to gain control over the device, disrupt services, or pivot into internal networks. The absence of known exploits in the wild does not reduce the urgency, as the vulnerability is straightforward to exploit given the parameters. This vulnerability highlights the importance of secure coding practices and timely patch management in embedded device firmware.
Potential Impact
For European organizations, the impact of CVE-2025-50398 is significant, especially for those relying on Mercury D196G devices in their network infrastructure. Successful exploitation can lead to complete compromise of the affected device, resulting in unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within the network. This can affect sectors such as telecommunications, manufacturing, energy, and government agencies that may use these devices for network management or control. The critical nature of the vulnerability means attackers can cause denial of service or implant persistent malware, undermining operational continuity and data integrity. Given the lack of patches, organizations face heightened risk exposure, and any compromise could lead to regulatory penalties under GDPR if personal data is affected. The threat also increases the risk of espionage or sabotage in geopolitically sensitive environments within Europe.
Mitigation Recommendations
1. Immediately isolate Mercury D196G devices from untrusted networks, especially the internet, to prevent remote exploitation. 2. Disable or restrict access to the fac_password parameter interface if possible, or apply strict input validation controls at network boundaries. 3. Implement network segmentation to limit the impact of a compromised device and prevent lateral movement. 4. Monitor network traffic and device logs for unusual activity indicative of exploitation attempts, such as malformed packets targeting the fac_password parameter. 5. Engage with the device vendor or supplier to obtain firmware updates or patches as soon as they become available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. 7. Conduct regular security audits and penetration testing focusing on embedded devices and their management interfaces. 8. Prepare incident response plans specifically addressing potential exploitation of this vulnerability to enable rapid containment and recovery.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694190eb9050fe8508040784
Added to database: 12/16/2025, 5:03:39 PM
Last enriched: 12/23/2025, 6:13:41 PM
Last updated: 2/7/2026, 12:09:01 PM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.