mercurycom CVE Vulnerabilities & Metrics

Focus on mercurycom vulnerabilities and metrics.

Last updated: 12 May 2026, 22:25 UTC

About mercurycom Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with mercurycom. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total mercurycom CVEs: 11
Earliest CVE date: 19 Sep 2012, 19:55 UTC
Latest CVE date: 27 Apr 2026, 19:16 UTC

Latest CVE reference: CVE-2026-35903

Rolling Stats

30-day Count (Rolling): 4
365-day Count (Rolling): 8

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical mercurycom CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.05

Max CVSS: 6.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 10
4.0-6.9 2
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS mercurycom CVEs

These are the five CVEs with the highest CVSS scores for mercurycom, sorted by severity first and recency.

All CVEs for mercurycom

CVE-2026-35903 mercurycom vulnerability CVSS: 0 27 Apr 2026, 19:16 UTC

MERCURY MIPC252W IP camera 1.0.5 Build 230306 Rel.79931n contains an improper authentication vulnerability in the RTSP service. After successful Digest authentication in an initial DESCRIBE request, the device does not verify the Digest response parameter in subsequent RTSP requests within the same session. As a result, RTSP methods such as SETUP, PLAY, and TEARDOWN can be processed even when the Authorization header contains an empty or invalid response value, as long as the nonce and session identifier correspond to a previously authenticated session. This allows an attacker with network access to reuse session parameters and issue unauthorized RTSP control commands without computing a valid Digest response.

CVE-2026-35902 mercurycom vulnerability CVSS: 0 27 Apr 2026, 19:16 UTC

The RTSP service of MERCURY IP camera MIPC252W 1.0.5 Build 230306 has an issue handling failed Digest authentication attempts. By repeatedly sending RTSP requests with invalid authentication parameters, an unauthenticated attacker can cause the RTSP service to enter a persistent authentication failure state, preventing legitimate clients from authenticating and leading to a denial of service.

CVE-2026-35901 mercurycom vulnerability CVSS: 0 27 Apr 2026, 19:16 UTC

A handling issue in the RTSP service of the Mercury MIPC252W 1.0.5 Build 230306 Rel.79931n allows an authenticated attacker to trigger session termination by repeatedly sending SETUP requests for the same media track within a single RTSP session. This causes the server to reset the RTSP connection, leading to a denial-of-service condition.

CVE-2026-31256 mercurycom vulnerability CVSS: 0 27 Apr 2026, 19:16 UTC

A null pointer dereference vulnerability exists in the RTSP service of the MERCURY MIPC252W 1.0.5 Build 230306 Rel.79931n. During the processing of a SETUP request for the path rtsp://<IP>:554/stream1/track2, the device fails to properly validate the Transport header field. When this header is improperly constructed, the RTSP service can dereference a NULL pointer during request parsing. Successful exploitation causes the device to crash and automatically reboot.

CVE-2025-50401 mercurycom vulnerability CVSS: 0 16 Dec 2025, 17:16 UTC

Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter password.

CVE-2025-50398 mercurycom vulnerability CVSS: 0 16 Dec 2025, 17:16 UTC

Mercury D196G d196gv1-cn-up_2020-01-09_11.21.44 is vulnerable to Buffer Overflow in the function sub_404CAEDC via the parameter fac_password.

CVE-2025-65289 mercurycom vulnerability CVSS: 0 09 Dec 2025, 17:15 UTC

A stored Cross site scripting (XSS) vulnerability in the Mercury MR816v2 (081C3114 4.8.7 Build 110427 Rel 36550n) router allows a remote attacker on the LAN to inject JavaScript into the router's management UI by submitting a malicious hostname. The injected script is stored and later executed in the context of an administrator's browser (for example after DHCP release/renew triggers the interface to display the stored hostname). Because the management interface uses weak/basic authentication and does not properly protect or isolate session material, the XSS can be used to exfiltrate the admin session and perform administrative actions.

CVE-2025-65288 mercurycom vulnerability CVSS: 0 09 Dec 2025, 17:15 UTC

A buffer overflow in the Mercury MR816v2 (081C3114 4.8.7 Build 110427 Rel 36550n) occurs when the device accepts and stores excessively long hostnames from LAN hosts without proper length validation. The affected code performs unchecked copies/concatenations into fixed-size buffers. A crafted long hostname can overflow the buffer, cause a crash (DoS) and potentially enabling remote code execution.

CVE-2023-46518 mercurycom vulnerability CVSS: 0 25 Oct 2023, 18:17 UTC

Mercury A15 V1.0 20230818_1.0.3 was discovered to contain a command execution vulnerability via the component cloudDeviceTokenSuccCB.

CVE-2021-27825 mercurycom vulnerability CVSS: 0 29 May 2023, 19:15 UTC

A directory traversal vulnerability on Mercury MAC1200R devices allows attackers to read arbitrary files via a web-static/ URL.

CVE-2022-31849 mercurycom vulnerability CVSS: 6.5 16 Jun 2022, 15:15 UTC

MERCURY MIPC451-4 1.0.22 Build 220105 Rel.55642n was discovered to contain a remote code execution (RCE) vulnerability which is exploitable via a crafted POST request.

CVE-2012-4999 mercurycom vulnerability CVSS: 6.1 19 Sep 2012, 19:55 UTC

Mercury MR804 Router 8.0 3.8.1 Build 101220 Rel.53006nB allows remote attackers to cause a denial of service (service hang) via a crafted string in HTTP header fields such as (1) If-Modified-Since, (2) If-None-Match, or (3) If-Unmodified-Since. NOTE: some of these details are obtained from third party information.