Filtered by vendor Mercurycom Subscriptions
Total 14 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2026-35901 2 Mercury, Mercurycom 3 Mipc252w, Mipc252w, Mipc252w Firmware 2026-05-05 4.4 Medium
A handling issue in the RTSP service of the Mercury MIPC252W 1.0.5 Build 230306 Rel.79931n allows an authenticated attacker to trigger session termination by repeatedly sending SETUP requests for the same media track within a single RTSP session. This causes the server to reset the RTSP connection, leading to a denial-of-service condition.
CVE-2026-35902 2 Mercury, Mercurycom 3 Mipc252w, Mipc252w, Mipc252w Firmware 2026-05-05 6.2 Medium
The RTSP service of MERCURY IP camera MIPC252W 1.0.5 Build 230306 has an issue handling failed Digest authentication attempts. By repeatedly sending RTSP requests with invalid authentication parameters, an unauthenticated attacker can cause the RTSP service to enter a persistent authentication failure state, preventing legitimate clients from authenticating and leading to a denial of service.
CVE-2026-35903 2 Mercury, Mercurycom 3 Mipc252w, Mipc252w, Mipc252w Firmware 2026-05-05 9.8 Critical
MERCURY MIPC252W IP camera 1.0.5 Build 230306 Rel.79931n contains an improper authentication vulnerability in the RTSP service. After successful Digest authentication in an initial DESCRIBE request, the device does not verify the Digest response parameter in subsequent RTSP requests within the same session. As a result, RTSP methods such as SETUP, PLAY, and TEARDOWN can be processed even when the Authorization header contains an empty or invalid response value, as long as the nonce and session identifier correspond to a previously authenticated session. This allows an attacker with network access to reuse session parameters and issue unauthorized RTSP control commands without computing a valid Digest response.
CVE-2026-31256 2 Mercury, Mercurycom 3 Mipc252w, Mipc252w, Mipc252w Firmware 2026-05-05 7.5 High
A null pointer dereference vulnerability exists in the RTSP service of the MERCURY MIPC252W 1.0.5 Build 230306 Rel.79931n. During the processing of a SETUP request for the path rtsp://<IP>:554/stream1/track2, the device fails to properly validate the Transport header field. When this header is improperly constructed, the RTSP service can dereference a NULL pointer during request parsing. Successful exploitation causes the device to crash and automatically reboot.
CVE-2024-8655 1 Mercurycom 1 Mnvr816 Firmware 2026-04-15 5.3 Medium
A vulnerability was found in Mercury MNVR816 up to 2.0.1.0.5. It has been classified as problematic. This affects an unknown part of the file /web-static/. The manipulation leads to files or directories accessible. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-44167 2 Apple, Mercurycom 6 Ios And Ipados, Ipados, Iphone Os and 3 more 2026-04-02 8.1 High
This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 18 and iPadOS 18, macOS Sequoia 15, macOS Sonoma 14.7, macOS Ventura 13.7, visionOS 2. An app may be able to overwrite arbitrary files.
CVE-2025-50401 2 Mercurycom, Mercusys 4 D196g, D196g Firmware, Mercury D196g and 1 more 2025-12-22 9.8 Critical
Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter password.
CVE-2025-50398 2 Mercurycom, Mercusys 4 D196g, D196g Firmware, Mercury D196g and 1 more 2025-12-22 9.8 Critical
Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter fac_password.
CVE-2025-65288 2 Mercury, Mercurycom 3 Mr816v2, Mr816, Mr816 Firmware 2025-12-12 6.5 Medium
A buffer overflow in the Mercury MR816v2 (081C3114 4.8.7 Build 110427 Rel 36550n) occurs when the device accepts and stores excessively long hostnames from LAN hosts without proper length validation. The affected code performs unchecked copies/concatenations into fixed-size buffers. A crafted long hostname can overflow the buffer, cause a crash (DoS) and potentially enabling remote code execution.
CVE-2025-65289 2 Mercury, Mercurycom 3 Mr816v2, Mr816, Mr816 Firmware 2025-12-12 6.1 Medium
A stored Cross site scripting (XSS) vulnerability in the Mercury MR816v2 (081C3114 4.8.7 Build 110427 Rel 36550n) router allows a remote attacker on the LAN to inject JavaScript into the router's management UI by submitting a malicious hostname. The injected script is stored and later executed in the context of an administrator's browser (for example after DHCP release/renew triggers the interface to display the stored hostname). Because the management interface uses weak/basic authentication and does not properly protect or isolate session material, the XSS can be used to exfiltrate the admin session and perform administrative actions.
CVE-2012-4999 1 Mercurycom 2 Mr804, Mr804 Firmware 2025-04-11 N/A
Mercury MR804 Router 8.0 3.8.1 Build 101220 Rel.53006nB allows remote attackers to cause a denial of service (service hang) via a crafted string in HTTP header fields such as (1) If-Modified-Since, (2) If-None-Match, or (3) If-Unmodified-Since. NOTE: some of these details are obtained from third party information.
CVE-2021-27825 1 Mercurycom 2 Mac1200r, Mac1200r Firmware 2025-01-14 7.5 High
A directory traversal vulnerability on Mercury MAC1200R devices allows attackers to read arbitrary files via a web-static/ URL.
CVE-2023-46518 1 Mercurycom 2 A15, A15 Firmware 2024-11-21 9.8 Critical
Mercury A15 V1.0 20230818_1.0.3 was discovered to contain a command execution vulnerability via the component cloudDeviceTokenSuccCB.
CVE-2022-31849 1 Mercurycom 2 Mipc451-4, Mipc451-4 Firmware 2024-11-21 8.8 High
MERCURY MIPC451-4 1.0.22 Build 220105 Rel.55642n was discovered to contain a remote code execution (RCE) vulnerability which is exploitable via a crafted POST request.