Skip to content

Instantly share code, notes, and snippets.

@BarrYPL
Last active May 7, 2026 06:06
Show Gist options
  • Select an option

  • Save BarrYPL/13dcd071673866cbbfaaa05085b98cf3 to your computer and use it in GitHub Desktop.

Select an option

Save BarrYPL/13dcd071673866cbbfaaa05085b98cf3 to your computer and use it in GitHub Desktop.

CVE-2026-31267 – Mercusys MW302R Denial of Service

Summary

A denial-of-service vulnerability exists in the administrative web interface of Mercusys MW302R firmware version 1.4.10 (Build 231023) and earlier.

Affected Product

  • Vendor: Mercusys
  • Product: MW302R
  • Affected Firmware Version: MW302R(EU)_V1_1.4.10 Build 231023
  • Component: Administrative Web Interface

Vulnerability Details

Description

A stack buffer overflow vulnerability in the administrative web interface allows an authenticated attacker with administrative privileges to trigger a system crash by sending a specially crafted request. The vulnerability results in denial of service through control flow manipulation to an arbitrary instruction address.

Attack Vector

  • Type: Local/Network (requires access to administrative interface)
  • Authentication: Required (administrator credentials)
  • User Interaction: None
  • Impact: Denial of Service - system reboot/crash

CVSS v4.0 Score

Base Score: 4.9 (Medium)
Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Vendor Status

Acknowledged by vendor – Mercusys Security Team
Patch released – Official firmware update available

Fixed Version

Discoverer

Bartosz "BarrYPL" Osuch
Security Researcher
https://barry-dev.xyz

References

Timeline

  • 2026-04-09: CVE-2026-31267 reserved
  • 2026-04-29: Vendor patch released
  • 2026-05-06: Public disclosure request submitted
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment