CVE-2025-50401: n/a
Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter password.
AI Analysis
Technical Summary
CVE-2025-50401 identifies a critical buffer overflow vulnerability in the Mercury D196G device firmware, specifically in the function sub_404CAEDC, triggered via the password parameter. This vulnerability is classified under CWE-120, which relates to classic buffer overflow issues where insufficient bounds checking allows overwriting adjacent memory. The flaw can be exploited remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to arbitrary code execution, compromising the device's confidentiality, integrity, and availability. The vulnerability affects the firmware version d196gv1-cn-up_2020-01-09_11.21.44, though exact version ranges are not specified. No patches or fixes have been released yet, and no known exploits have been detected in the wild, but the high CVSS score of 9.8 underscores the critical severity and ease of exploitation. This vulnerability poses a significant risk to network infrastructure relying on Mercury D196G devices, potentially allowing attackers to gain control over affected devices, disrupt services, or pivot into internal networks.
Potential Impact
For European organizations, the impact of CVE-2025-50401 is substantial. Mercury D196G devices are often used in network routing and infrastructure roles; compromise could lead to full device takeover, enabling attackers to intercept, modify, or disrupt network traffic. This threatens the confidentiality of sensitive communications, the integrity of network operations, and the availability of critical services. Sectors such as telecommunications, government, finance, and critical infrastructure are particularly vulnerable due to their reliance on robust network devices. Exploitation could facilitate lateral movement within networks, data exfiltration, or denial of service attacks. Given the lack of patches, organizations face an elevated risk window, increasing the urgency for defensive measures. The absence of required authentication and user interaction further amplifies the threat, making automated or wormable attacks plausible if exploit code emerges.
Mitigation Recommendations
1. Immediately isolate Mercury D196G devices from untrusted networks, especially the internet, to reduce exposure. 2. Disable remote management interfaces or restrict access to trusted IP addresses only. 3. Implement strict network segmentation to limit lateral movement if a device is compromised. 4. Monitor network traffic and device logs for anomalous behavior indicative of exploitation attempts, such as unexpected reboots or unusual command execution. 5. Engage with Mercury device vendors or suppliers to obtain firmware updates or patches as soon as they become available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting buffer overflow attempts on these devices. 7. Conduct regular vulnerability assessments and penetration tests focusing on network infrastructure devices. 8. Develop and rehearse incident response plans specific to network device compromise scenarios. 9. Maintain an inventory of all Mercury devices within the organization to ensure comprehensive coverage of mitigation efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-50401: n/a
Description
Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter password.
AI-Powered Analysis
Technical Analysis
CVE-2025-50401 identifies a critical buffer overflow vulnerability in the Mercury D196G device firmware, specifically in the function sub_404CAEDC, triggered via the password parameter. This vulnerability is classified under CWE-120, which relates to classic buffer overflow issues where insufficient bounds checking allows overwriting adjacent memory. The flaw can be exploited remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to arbitrary code execution, compromising the device's confidentiality, integrity, and availability. The vulnerability affects the firmware version d196gv1-cn-up_2020-01-09_11.21.44, though exact version ranges are not specified. No patches or fixes have been released yet, and no known exploits have been detected in the wild, but the high CVSS score of 9.8 underscores the critical severity and ease of exploitation. This vulnerability poses a significant risk to network infrastructure relying on Mercury D196G devices, potentially allowing attackers to gain control over affected devices, disrupt services, or pivot into internal networks.
Potential Impact
For European organizations, the impact of CVE-2025-50401 is substantial. Mercury D196G devices are often used in network routing and infrastructure roles; compromise could lead to full device takeover, enabling attackers to intercept, modify, or disrupt network traffic. This threatens the confidentiality of sensitive communications, the integrity of network operations, and the availability of critical services. Sectors such as telecommunications, government, finance, and critical infrastructure are particularly vulnerable due to their reliance on robust network devices. Exploitation could facilitate lateral movement within networks, data exfiltration, or denial of service attacks. Given the lack of patches, organizations face an elevated risk window, increasing the urgency for defensive measures. The absence of required authentication and user interaction further amplifies the threat, making automated or wormable attacks plausible if exploit code emerges.
Mitigation Recommendations
1. Immediately isolate Mercury D196G devices from untrusted networks, especially the internet, to reduce exposure. 2. Disable remote management interfaces or restrict access to trusted IP addresses only. 3. Implement strict network segmentation to limit lateral movement if a device is compromised. 4. Monitor network traffic and device logs for anomalous behavior indicative of exploitation attempts, such as unexpected reboots or unusual command execution. 5. Engage with Mercury device vendors or suppliers to obtain firmware updates or patches as soon as they become available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting buffer overflow attempts on these devices. 7. Conduct regular vulnerability assessments and penetration tests focusing on network infrastructure devices. 8. Develop and rehearse incident response plans specific to network device compromise scenarios. 9. Maintain an inventory of all Mercury devices within the organization to ensure comprehensive coverage of mitigation efforts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694190eb9050fe8508040787
Added to database: 12/16/2025, 5:03:39 PM
Last enriched: 12/23/2025, 6:13:53 PM
Last updated: 2/5/2026, 11:01:05 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighCVE-2026-24300: CWE-284: Improper Access Control in Microsoft Azure Front Door
CriticalCVE-2026-21532: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Azure Functions
HighCVE-2026-0391: CWE-451: User Interface (UI) Misrepresentation of Critical Information in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2026-1970: Open Redirect in Edimax BR-6258n
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.