Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62771: CWE-352 Cross-Site Request Forgery (CSRF) in Mercku M6a

0
High
VulnerabilityCVE-2025-62771cvecve-2025-62771cwe-352
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Mercku
Product: M6a

Description

Mercku M6a devices through 2.1.0 allow password changes via intranet CSRF attacks.

AI-Powered Analysis

AILast updated: 10/22/2025, 03:46:40 UTC

Technical Analysis

CVE-2025-62771 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Mercku M6a devices running firmware versions up to 2.1.0. The vulnerability allows an attacker who has access to the same intranet as the device to perform unauthorized password changes without requiring authentication or user interaction. CSRF attacks exploit the trust a device places in a user's browser or network context, enabling malicious commands to be executed on the device by tricking it into accepting forged requests. In this case, the Mercku M6a device's web interface lacks sufficient CSRF protections, such as anti-CSRF tokens or proper validation of request origins, allowing attackers to send crafted HTTP requests that change the device password. The CVSS v3.1 score of 7.5 reflects a high severity due to the significant impact on confidentiality, integrity, and availability (all rated high), despite the attack vector being local network (AV:A) and requiring high attack complexity (AC:H). No privileges or user interaction are needed, which increases the risk once an attacker gains intranet access. Although no exploits have been reported in the wild, the vulnerability poses a serious threat to network security, as password changes can lock out legitimate users and enable persistent unauthorized access. The lack of available patches necessitates immediate mitigation through network controls and monitoring.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized control over Mercku M6a devices, potentially disrupting network operations and compromising sensitive data. Password changes without authorization can result in denial of service by locking out administrators or enable attackers to maintain persistent access for further exploitation. Organizations relying on these devices for critical network infrastructure or in environments with sensitive data are at heightened risk. The requirement for intranet access limits remote exploitation but does not eliminate risk, especially in environments with weak internal network segmentation or compromised endpoints. The impact extends to confidentiality breaches, integrity violations, and availability disruptions, which could affect business continuity and compliance with data protection regulations such as GDPR. Additionally, the absence of patches increases the window of exposure, necessitating proactive defensive measures.

Mitigation Recommendations

1. Implement strict network segmentation to isolate Mercku M6a devices from general user networks, limiting intranet access only to trusted administrators and systems. 2. Employ network access controls such as 802.1X authentication and VLANs to restrict unauthorized devices from connecting to the intranet segment hosting the Mercku devices. 3. Monitor network traffic for unusual HTTP requests targeting the device's management interface, particularly POST requests that could indicate CSRF attempts. 4. Disable or restrict web management interfaces on Mercku M6a devices if not required, or restrict access to management interfaces via IP whitelisting. 5. Educate network administrators about the vulnerability and the risks of intranet-based attacks to ensure vigilance. 6. Regularly check for firmware updates or vendor advisories and apply patches promptly once available. 7. Consider deploying web application firewalls or intrusion detection systems capable of detecting CSRF patterns within the local network. 8. Maintain strong endpoint security to prevent intranet devices from being compromised and used as attack vectors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-10-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f8501287e9a014511a9009

Added to database: 10/22/2025, 3:31:30 AM

Last enriched: 10/22/2025, 3:46:40 AM

Last updated: 10/23/2025, 5:04:27 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats