CVE-2025-62771

7.5 HIGH

📋 TL;DR

Mercku M6a devices allow attackers to change administrator passwords via cross-site request forgery (CSRF) attacks when accessed from the local network. This vulnerability affects Mercku M6a router users who have not applied security patches. Attackers can exploit this to gain unauthorized access to router administration.

💻 Affected Systems

Products:
  • Mercku M6a
Versions: through 2.1.0
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running vulnerable firmware versions are affected when accessed from the local network.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker on the local network could change the admin password, take full control of the router, reconfigure network settings, intercept traffic, or deploy malware to connected devices.

🟠

Likely Case

An attacker with local network access changes the admin password, locking out legitimate administrators and potentially redirecting DNS or modifying firewall rules.

🟢

If Mitigated

With proper network segmentation and access controls, the attack surface is limited to trusted internal users only.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to trick an authenticated admin into visiting a malicious webpage while on the local network.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >2.1.0

Vendor Advisory: https://blog.nullvoid.me/posts/mercku-exploits/

Restart Required: Yes

Instructions:

1. Log into Mercku admin interface. 2. Check for firmware updates in System Settings. 3. Apply any available updates. 4. Reboot the device after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Mercku M6a management interface to a dedicated VLAN with strict access controls.

Browser CSRF Protection

all

Use browser extensions that block CSRF attempts or disable automatic form submission.

🧯 If You Can't Patch

  • Restrict local network access to trusted devices only using MAC filtering or 802.1X authentication.
  • Implement strict outbound web filtering to block malicious sites that could host CSRF payloads.

🔍 How to Verify

Check if Vulnerable:

Access Mercku admin interface, navigate to System Information, check firmware version. If version is 2.1.0 or earlier, device is vulnerable.

Check Version:

curl -k https://[router-ip]/api/system/info | grep version

Verify Fix Applied:

After updating, verify firmware version is greater than 2.1.0 in System Information.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected password change events in router logs
  • Multiple failed login attempts followed by successful password reset

Network Indicators:

  • HTTP POST requests to /api/user/password from unexpected internal IPs
  • Unusual outbound traffic patterns after admin interface access

SIEM Query:

source="mercku-router" action="password_change" src_ip!=admin_workstation

🔗 References

📤 Share & Export