Published:2026/03/11 Last Updated:2026/03/11
JVNVU#98103854
Multiple vulnerabilities in Micro Research MR-GM5L-S1 and MR-GM5A-L1
Overview
MR-GM5L-S1 and MR-GM5A-L1 provided by Micro Research Ltd. contain multiple vulnerabilities.
Products Affected
- MR-GM5L-S1 firmware versions prior to v2.01.04N1_02
- MR-GM5A-L1 firmware versions prior to v2.01.04N1_02
Description
MR-GM5L-S1 and MR-GM5A-L1 provided by Micro Research Ltd. contain multiple vulnerabilities listed below.
- Code injection (CWE-94)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.6
- CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score 7.2
- CVE-2026-20892
- Use of hard-coded credentials (CWE-798)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 9.3
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 9.8
- CVE-2026-24448
- Authentication bypass using an alternate path or channel (CWE-288)
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 9.3
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 9.8
- CVE-2026-27842
Impact
- An attacker with administrative privileges may execute arbitrary commands (CVE-2026-20892)
- An attacker may obtain administrative access (CVE-2026-24448)
- An attacker may bypass authentication and change the device configuration (CVE-2026-27842)
Solution
Update the firmware
Update the firmware to the latest version according to the information provided by the developer.
Vendor Status
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
Other Information
| JPCERT Alert |
|
| JPCERT Reports |
|
| CERT Advisory |
|
| CPNI Advisory |
|
| TRnotes |
|
| CVE |
CVE-2026-20892 |
|
CVE-2026-24448 |
|
|
CVE-2026-27842 |
|
| JVN iPedia |
|