Impact
Authentication bypass issue exists in Micro Research Ltd. devices MR-GM5L-S1 and MR-GM5A-L1, allowing an attacker to access and modify device configuration settings without proper authentication. The identified weakness is CWE-288, which indicates improper enforcement of authentication controls. An exploited vulnerability would give attackers the ability to change configuration parameters, potentially altering device behavior or connectivity.
Affected Systems
The affected systems are the Micro Research Ltd. MR‑GM5L‑S1 and MR‑GM5A‑L1 models. No specific firmware or patch version information was provided, so any installed firmware on these models should be considered vulnerable until a vendor update is applied.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.3, indicating critical severity, while the EPSS score is reported as less than 1%, suggesting a low current exploitation probability. This issue is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is remote through the device’s management interface; local access may also enable exploitation, but the required conditions are minimal, contributing to a high risk level.
OpenCVE Enrichment