CVE-2025-62771: CWE-352 Cross-Site Request Forgery (CSRF) in Mercku M6a
Mercku M6a devices through 2.1.0 allow password changes via intranet CSRF attacks.
AI Analysis
Technical Summary
CVE-2025-62771 is a Cross-Site Request Forgery (CSRF) vulnerability classified under CWE-352 that affects Mercku M6a networking devices running firmware versions up to 2.1.0. The vulnerability allows an attacker who can send requests within the local network (intranet) to change the device's password without requiring any authentication or user interaction. CSRF attacks exploit the trust a device places in a user's browser or network session, enabling unauthorized commands to be executed. In this case, the Mercku M6a device fails to properly validate the origin or authenticity of password change requests, allowing an attacker to craft malicious requests that the device accepts as legitimate. The CVSS v3.1 score of 7.5 (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that the attack vector is adjacent network (intranet), requires high attack complexity, no privileges or user interaction, and impacts confidentiality, integrity, and availability at a high level. The vulnerability could lead to complete takeover of the device by changing the password, potentially disrupting network operations or enabling further attacks. No patches or exploits are currently documented, but the risk remains significant due to the nature of the flaw and the critical role of such devices in network infrastructure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Mercku M6a devices are typically used in small to medium enterprise environments and possibly in critical infrastructure segments. An attacker exploiting this vulnerability could gain unauthorized administrative access by changing device passwords, leading to potential network disruption, interception of sensitive data, or pivoting to other internal systems. Confidentiality is compromised as attackers could manipulate device settings or capture traffic. Integrity is affected through unauthorized configuration changes, and availability could be impacted if devices are locked out or misconfigured. The vulnerability is particularly concerning in environments with lax intranet access controls or where devices are exposed to untrusted internal users or compromised endpoints. European organizations with dense deployments of Mercku devices or those in sectors like finance, healthcare, or government should consider this a high priority threat.
Mitigation Recommendations
1. Immediately restrict access to the Mercku M6a device management interface to trusted network segments only, using VLANs or firewall rules to isolate the device from general intranet access. 2. Implement network segmentation to separate critical network devices from user workstations and guest networks, reducing the attack surface. 3. Monitor network traffic for unusual POST requests or configuration changes targeting Mercku devices, employing intrusion detection systems with custom signatures if possible. 4. Enforce strong internal network security policies, including endpoint security to prevent compromised devices from launching CSRF attacks. 5. Contact Mercku support for firmware updates or patches addressing this vulnerability and apply them promptly once available. 6. If patches are unavailable, consider deploying compensating controls such as disabling remote management features or using VPNs with strict authentication for device access. 7. Educate network administrators about the risks of CSRF and ensure secure management practices are followed. 8. Regularly audit device configurations and access logs to detect unauthorized changes early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Sweden, Italy, Spain
CVE-2025-62771: CWE-352 Cross-Site Request Forgery (CSRF) in Mercku M6a
Description
Mercku M6a devices through 2.1.0 allow password changes via intranet CSRF attacks.
AI-Powered Analysis
Technical Analysis
CVE-2025-62771 is a Cross-Site Request Forgery (CSRF) vulnerability classified under CWE-352 that affects Mercku M6a networking devices running firmware versions up to 2.1.0. The vulnerability allows an attacker who can send requests within the local network (intranet) to change the device's password without requiring any authentication or user interaction. CSRF attacks exploit the trust a device places in a user's browser or network session, enabling unauthorized commands to be executed. In this case, the Mercku M6a device fails to properly validate the origin or authenticity of password change requests, allowing an attacker to craft malicious requests that the device accepts as legitimate. The CVSS v3.1 score of 7.5 (AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates that the attack vector is adjacent network (intranet), requires high attack complexity, no privileges or user interaction, and impacts confidentiality, integrity, and availability at a high level. The vulnerability could lead to complete takeover of the device by changing the password, potentially disrupting network operations or enabling further attacks. No patches or exploits are currently documented, but the risk remains significant due to the nature of the flaw and the critical role of such devices in network infrastructure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Mercku M6a devices are typically used in small to medium enterprise environments and possibly in critical infrastructure segments. An attacker exploiting this vulnerability could gain unauthorized administrative access by changing device passwords, leading to potential network disruption, interception of sensitive data, or pivoting to other internal systems. Confidentiality is compromised as attackers could manipulate device settings or capture traffic. Integrity is affected through unauthorized configuration changes, and availability could be impacted if devices are locked out or misconfigured. The vulnerability is particularly concerning in environments with lax intranet access controls or where devices are exposed to untrusted internal users or compromised endpoints. European organizations with dense deployments of Mercku devices or those in sectors like finance, healthcare, or government should consider this a high priority threat.
Mitigation Recommendations
1. Immediately restrict access to the Mercku M6a device management interface to trusted network segments only, using VLANs or firewall rules to isolate the device from general intranet access. 2. Implement network segmentation to separate critical network devices from user workstations and guest networks, reducing the attack surface. 3. Monitor network traffic for unusual POST requests or configuration changes targeting Mercku devices, employing intrusion detection systems with custom signatures if possible. 4. Enforce strong internal network security policies, including endpoint security to prevent compromised devices from launching CSRF attacks. 5. Contact Mercku support for firmware updates or patches addressing this vulnerability and apply them promptly once available. 6. If patches are unavailable, consider deploying compensating controls such as disabling remote management features or using VPNs with strict authentication for device access. 7. Educate network administrators about the risks of CSRF and ensure secure management practices are followed. 8. Regularly audit device configurations and access logs to detect unauthorized changes early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f8501287e9a014511a9009
Added to database: 10/22/2025, 3:31:30 AM
Last enriched: 10/29/2025, 4:38:47 AM
Last updated: 12/7/2025, 2:17:08 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14192: SQL Injection in RashminDungrani online-banking
MediumCVE-2025-14193: SQL Injection in code-projects Employee Profile Management System
MediumCVE-2025-14191: Buffer Overflow in UTT 进取 512W
HighCVE-2025-14190: SQL Injection in Chanjet TPlus
MediumCVE-2025-14189: SQL Injection in Chanjet CRM
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.