CVE-2025-7882: Brute Force Bypass via IP Cycling
CVE Publication: https://www.cve.org/CVERecord?id=CVE-2025-7882
Summary
The Mercusys MW301R router implements a basic brute-force protection mechanism that blocks login attempts after a number of failed tries. However, this blocking mechanism is based solely on the source IP address, without enforcing any session fingerprinting, token validation, or advanced rate-limiting / and MAC Address, etc.
Details
An attacker connected to the LAN can simply change their local IP address (e.g., from 192.168.1.10 to 192.168.1.11) after reaching the limit, effectively resetting the login attempt counter.This allows a brute-force attack to be performed against the admin login page, completely defeating the intended security mechanism.- Connect to the same local network as the router (default gateway:
192.168.1.1
) to prepare the attack environment. - Start brute-force login attempts by sending requests with different password values. After a few failures, the router will block further attempts from that IP address.
- To bypass the block, change your deviceâs IP address to another one within the allowed range, then continue the brute-force process from the new IP.
- Repeat this processâeach time your IP is blocked, switch to another IP between
192.168.1.4
and192.168.1.254
and resume the attack.
Exploit Code:
|
|
PoC
Video PoC
Impact
The lack of session validation in this endpoint can lead to several security risks:
- Unauthorized Data Exposure: Unauthenticated users can enumerate or retrieve sensitive internal data.
- Privilege Escalation: Attackers might access or infer information intended only for authorized users.
- Information Disclosure: Business logic and internal IDs (like user roles or permissions) can be leaked.
- Reconnaissance Support: Facilitates attackers in mapping backend structures for more targeted attacks.
Reference
https://github.com/RaulPazemecxas/PoCVulDb/blob/main/CVE-2025-7882.md
Finder
By: CVE-Hunters