Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50398: n/a

0
Critical
VulnerabilityCVE-2025-50398cvecve-2025-50398
Published: Tue Dec 16 2025 (12/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter fac_password.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:13:41 UTC

Technical Analysis

CVE-2025-50398 is a critical buffer overflow vulnerability identified in the Mercury D196G device firmware version d196gv1-cn-up_2020-01-09_11.21.44. The vulnerability exists in the function sub_404CAEDC, which processes the fac_password parameter. A buffer overflow occurs when this parameter is supplied with specially crafted input, allowing an attacker to overwrite memory and execute arbitrary code remotely without authentication or user interaction. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), which is a well-known category of memory corruption bugs that can lead to full system compromise. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). Although no patches or fixes have been released yet, the vulnerability poses a severe risk to any network-exposed Mercury D196G devices, potentially allowing attackers to gain control over the device, disrupt services, or pivot into internal networks. The absence of known exploits in the wild does not reduce the urgency, as the vulnerability is straightforward to exploit given the parameters. This vulnerability highlights the importance of secure coding practices and timely patch management in embedded device firmware.

Potential Impact

For European organizations, the impact of CVE-2025-50398 is significant, especially for those relying on Mercury D196G devices in their network infrastructure. Successful exploitation can lead to complete compromise of the affected device, resulting in unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within the network. This can affect sectors such as telecommunications, manufacturing, energy, and government agencies that may use these devices for network management or control. The critical nature of the vulnerability means attackers can cause denial of service or implant persistent malware, undermining operational continuity and data integrity. Given the lack of patches, organizations face heightened risk exposure, and any compromise could lead to regulatory penalties under GDPR if personal data is affected. The threat also increases the risk of espionage or sabotage in geopolitically sensitive environments within Europe.

Mitigation Recommendations

1. Immediately isolate Mercury D196G devices from untrusted networks, especially the internet, to prevent remote exploitation. 2. Disable or restrict access to the fac_password parameter interface if possible, or apply strict input validation controls at network boundaries. 3. Implement network segmentation to limit the impact of a compromised device and prevent lateral movement. 4. Monitor network traffic and device logs for unusual activity indicative of exploitation attempts, such as malformed packets targeting the fac_password parameter. 5. Engage with the device vendor or supplier to obtain firmware updates or patches as soon as they become available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. 7. Conduct regular security audits and penetration testing focusing on embedded devices and their management interfaces. 8. Prepare incident response plans specifically addressing potential exploitation of this vulnerability to enable rapid containment and recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694190eb9050fe8508040784

Added to database: 12/16/2025, 5:03:39 PM

Last enriched: 12/23/2025, 6:13:41 PM

Last updated: 2/7/2026, 10:18:50 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats