Impact
A flaw in the Bluetooth handler of the MPOS M6 PLUS 1V.31-N allows an attacker on the same local network to replay captured authentication data and bypass normal authentication. The vulnerability is a classic authentication bypass and replay attack, as classified by CWE-287 and CWE-294. By exploiting this weakness, an unauthorized user may gain unauthenticated access to the device’s services and potentially read or modify sensitive information, in addition to any functional privileges granted to an authenticated user.
Affected Systems
The affected hardware is the Shenzhen HCC Technology MPOS M6 PLUS, specifically firmware version 1V.31‑N. No other versions or products are listed as impacted in the current advisory.
Risk and Exploitability
The CVSS score of 2.3 indicates low intrinsic severity, and the Exploit Prediction Score is not provided. The issue is not listed in the CISA KEV catalog. The attack requires proximity to the device on the local network, with high exploitation complexity and low likelihood of success. If an attacker can physically route traffic through the Bluetooth interface, they could replay authentication packets, making the risk higher in environments where such devices are exposed to untrusted networks.
OpenCVE Enrichment