Vulnerability Description
The RTSP service of MERCURY IP camera MIPC252W 1.0.5 Build 230306 has an issue handling failed Digest authentication attempts. By repeatedly sending RTSP requests with invalid authentication parameters, an unauthenticated attacker can cause the RTSP service to enter a persistent authentication failure state, preventing legitimate clients from authenticating and leading to a denial of service.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mercurycom | Mipc252W Firmware | 1.0.5 |
| Mercurycom | Mipc252W | - |
Related Weaknesses (CWE)
References
- https://github.com/izxnfirh8148/CVE_REQUESTS_references/blob/main/MERCURY_MIPC25ExploitThird Party Advisory
- https://github.com/izxnfirh8148/CVE_REQUESTS_references/blob/main/MERCURY_MIPC25ExploitThird Party Advisory
FAQ
What is CVE-2026-35902?
CVE-2026-35902 is a vulnerability with a CVSS score of 6.2 (MEDIUM). The RTSP service of MERCURY IP camera MIPC252W 1.0.5 Build 230306 has an issue handling failed Digest authentication attempts. By repeatedly sending RTSP requests with invalid authentication parameter...
How severe is CVE-2026-35902?
CVE-2026-35902 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35902?
Check the references section above for vendor advisories and patch information. Affected products include: Mercurycom Mipc252W Firmware, Mercurycom Mipc252W.