Impact
The vulnerability arises from an unprotected Bluetooth component in the MPOS M6 PLUS. Because the device does not perform authentication before establishing a connection, an attacker on the same local network can initiate communication without credentials. The flaw corresponds to authentication bypass weaknesses, allowing unauthorized use of Bluetooth APIs.
Affected Systems
The issue affects Shenzhen HCC Technology's MPOS M6 PLUS, specifically firmware version 1V.31‑N. No other vendors or products are listed. The exposure is confined to devices that run this firmware and have the Bluetooth module active.
Risk and Exploitability
The CVSS vector scores the risk as 2.3, indicating low severity. The EPSS score of 0.00041 (less than 1%) indicates an extremely low probability of exploitation, and the vulnerability is not listed in the KEV catalog. Exploitation requires proximity to the device on the local network and involves complex operations, so the likelihood of widespread attack is low. Nevertheless, local attackers could gain unauthorized control over the device, so the risk warrants monitoring and potentially disabling Bluetooth.
OpenCVE Enrichment