Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62775: CWE-669 Incorrect Resource Transfer Between Spheres in Mercku M6a

0
High
VulnerabilityCVE-2025-62775cvecve-2025-62775cwe-669
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Mercku
Product: M6a

Description

Mercku M6a devices through 2.1.0 allow root TELNET logins via the web admin password.

AI-Powered Analysis

AILast updated: 10/29/2025, 04:40:52 UTC

Technical Analysis

CVE-2025-62775 is a vulnerability identified in Mercku M6a devices running firmware version 2.1.0, classified under CWE-669, which involves incorrect resource transfer between security spheres. Specifically, the vulnerability allows root TELNET logins using the web admin password, effectively bypassing intended authentication mechanisms. This means that an attacker with network access and low privileges can escalate to root access remotely without requiring user interaction. The vulnerability arises because the device improperly shares authentication credentials or session tokens between the web administration interface and the TELNET service, which should be isolated. The CVSS 3.1 base score is 8.0, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits have been reported in the wild, the vulnerability's nature allows potential attackers to gain full control over the device, enabling them to intercept or manipulate network traffic, disrupt services, or use the device as a foothold for further attacks. The lack of available patches at the time of publication increases the urgency for interim mitigations. This vulnerability is particularly concerning for environments where Mercku M6a devices are deployed as critical network infrastructure, such as enterprise or industrial settings.

Potential Impact

For European organizations, the impact of CVE-2025-62775 can be severe. Compromise of Mercku M6a devices could lead to unauthorized root access, allowing attackers to intercept sensitive data, manipulate network configurations, or disrupt network availability. This could affect confidentiality of communications, integrity of network operations, and availability of services relying on these devices. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure that use Mercku M6a devices are at heightened risk. The vulnerability could facilitate lateral movement within corporate networks, enabling attackers to escalate privileges and access other critical systems. Additionally, the exposure of root TELNET access increases the risk of automated attacks or worm propagation within networks. The absence of public exploits currently provides a limited window for mitigation, but the high severity score and ease of exploitation mean that European organizations should act promptly to reduce risk.

Mitigation Recommendations

1. Immediately disable TELNET access on all Mercku M6a devices if possible, or restrict TELNET access to trusted management networks only. 2. Change the web admin password to a strong, unique value and ensure it is not reused elsewhere. 3. Implement network segmentation to isolate management interfaces from general user networks, reducing exposure to adjacent network attacks. 4. Monitor network traffic and device logs for unusual TELNET login attempts or other suspicious activities. 5. Apply strict access control lists (ACLs) to limit which IP addresses can reach the device management interfaces. 6. Regularly audit device configurations and firmware versions to identify vulnerable devices. 7. Engage with Mercku support channels to obtain patches or firmware updates as soon as they become available. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect attempts to exploit this vulnerability. 9. Educate network administrators about the risks of TELNET and encourage migration to more secure management protocols such as SSH. 10. Prepare incident response plans specific to network device compromise scenarios to enable rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-10-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f8501287e9a014511a9019

Added to database: 10/22/2025, 3:31:30 AM

Last enriched: 10/29/2025, 4:40:52 AM

Last updated: 12/7/2025, 2:39:08 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats