CVE-2025-62775

8.0 HIGH

📋 TL;DR

Mercku M6a devices allow root TELNET logins using the web admin password, enabling attackers to gain full administrative control. This affects Mercku M6a devices running firmware up to version 2.1.0. Attackers can exploit this to compromise the device and potentially pivot to internal networks.

💻 Affected Systems

Products:
  • Mercku M6a
Versions: through 2.1.0
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires TELNET service to be enabled and web admin password to be known or guessed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to network pivoting, data interception, malware deployment, and persistent backdoor installation.

🟠

Likely Case

Unauthorized root access allowing configuration changes, network traffic monitoring, and credential harvesting from connected devices.

🟢

If Mitigated

Limited impact if TELNET is disabled, strong passwords are used, and network segmentation isolates the device.

🌐 Internet-Facing: HIGH - Directly exploitable if device has internet-facing management interface or exposed TELNET service.
🏢 Internal Only: HIGH - Internal attackers or malware can exploit this to gain root access and pivot through the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires web admin password but uses simple TELNET authentication bypass. Public disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check Mercku website for firmware updates beyond version 2.1.0.

🔧 Temporary Workarounds

Disable TELNET service

linux

Completely disable TELNET access to prevent exploitation

telnetd -l /bin/login

Change web admin password

all

Use strong, unique password for web admin interface

🧯 If You Can't Patch

  • Disable TELNET service completely
  • Implement network segmentation to isolate Mercku devices
  • Monitor for TELNET connection attempts

🔍 How to Verify

Check if Vulnerable:

Attempt TELNET login as root using web admin password: telnet [device_ip]

Check Version:

Check web interface or use nmap to identify firmware version

Verify Fix Applied:

Verify TELNET service is disabled or requires different credentials than web admin password

📡 Detection & Monitoring

Log Indicators:

  • Failed/successful TELNET authentication attempts
  • Root login via TELNET
  • Multiple authentication attempts from single source

Network Indicators:

  • TELNET traffic to Mercku devices
  • Unusual outbound connections from Mercku devices
  • Port 23 traffic

SIEM Query:

source_ip="Mercku_device" AND (protocol="TELNET" OR port=23) AND (event_type="authentication" OR user="root")

🔗 References

📤 Share & Export