Mercury MR816v2 Buffer Overflow

MEDIUM (6.5) No Patch (5 days)

Threat Intelligence

Low Risk
EPSS Score: 0.04% chance of exploitation (percentile: 14%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The Mercury MR816v2 is a professional audio mixer used in live sound and recording applications. This vulnerability occurs when the device accepts and stores excessively long hostnames from LAN hosts without proper length validation, leading to a buffer overflow that can cause a crash (Denial of Service) and potentially enable remote code execution.

Am I affected?

You're affected if you use A buffer overflow. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

Affected Products

DynamiApps / Mercury MR816v2

How to fix

To fix this vulnerability, upgrade to version 4.8.7 Build 110427 Rel 36550n or later. Alternatively, as a temporary mitigation, set the hostname parameter to a fixed value in your device's configuration file (usually /etc/device-tree/config.txt). This can be done by running the following command: echo "hostname=fixed_value" >> /etc/device-tree/config.txt

References