Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-50401: n/a

0
Critical
VulnerabilityCVE-2025-50401cvecve-2025-50401
Published: Tue Dec 16 2025 (12/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter password.

AI-Powered Analysis

AILast updated: 12/23/2025, 18:13:53 UTC

Technical Analysis

CVE-2025-50401 identifies a critical buffer overflow vulnerability in the Mercury D196G device firmware, specifically in the function sub_404CAEDC, triggered via the password parameter. This vulnerability is classified under CWE-120, which relates to classic buffer overflow issues where insufficient bounds checking allows overwriting adjacent memory. The flaw can be exploited remotely without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Successful exploitation can lead to arbitrary code execution, compromising the device's confidentiality, integrity, and availability. The vulnerability affects the firmware version d196gv1-cn-up_2020-01-09_11.21.44, though exact version ranges are not specified. No patches or fixes have been released yet, and no known exploits have been detected in the wild, but the high CVSS score of 9.8 underscores the critical severity and ease of exploitation. This vulnerability poses a significant risk to network infrastructure relying on Mercury D196G devices, potentially allowing attackers to gain control over affected devices, disrupt services, or pivot into internal networks.

Potential Impact

For European organizations, the impact of CVE-2025-50401 is substantial. Mercury D196G devices are often used in network routing and infrastructure roles; compromise could lead to full device takeover, enabling attackers to intercept, modify, or disrupt network traffic. This threatens the confidentiality of sensitive communications, the integrity of network operations, and the availability of critical services. Sectors such as telecommunications, government, finance, and critical infrastructure are particularly vulnerable due to their reliance on robust network devices. Exploitation could facilitate lateral movement within networks, data exfiltration, or denial of service attacks. Given the lack of patches, organizations face an elevated risk window, increasing the urgency for defensive measures. The absence of required authentication and user interaction further amplifies the threat, making automated or wormable attacks plausible if exploit code emerges.

Mitigation Recommendations

1. Immediately isolate Mercury D196G devices from untrusted networks, especially the internet, to reduce exposure. 2. Disable remote management interfaces or restrict access to trusted IP addresses only. 3. Implement strict network segmentation to limit lateral movement if a device is compromised. 4. Monitor network traffic and device logs for anomalous behavior indicative of exploitation attempts, such as unexpected reboots or unusual command execution. 5. Engage with Mercury device vendors or suppliers to obtain firmware updates or patches as soon as they become available. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) with signatures targeting buffer overflow attempts on these devices. 7. Conduct regular vulnerability assessments and penetration tests focusing on network infrastructure devices. 8. Develop and rehearse incident response plans specific to network device compromise scenarios. 9. Maintain an inventory of all Mercury devices within the organization to ensure comprehensive coverage of mitigation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694190eb9050fe8508040787

Added to database: 12/16/2025, 5:03:39 PM

Last enriched: 12/23/2025, 6:13:53 PM

Last updated: 2/5/2026, 11:01:05 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats