Edimax
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Edimax product.
RSS Feeds for Edimax security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Edimax products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Edimax Sorted by Most Security Vulnerabilities since 2018
Known Exploited Edimax Vulnerabilities
The following Edimax vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
| Title | Description | Added |
|---|---|---|
| Edimax IC-7100 IP Camera OS Command Injection Vulnerability |
Edimax IC-7100 IP camera contains an OS command injection vulnerability due to improper input sanitization that allows an attacker to achieve remote code execution via specially crafted requests. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. CVE-2025-1316 Exploit Probability: 85.3% |
March 19, 2025 |
The vulnerability CVE-2025-1316: Edimax IC-7100 IP Camera OS Command Injection Vulnerability is in the top 1% of the currently known exploitable vulnerabilities.
By the Year
In 2026 there have been 8 vulnerabilities in Edimax with an average score of 6.2 out of ten. Last year, in 2025 Edimax had 30 security vulnerabilities published. At the current rates, it appears that the number of vulnerabilities last year and this year may equal out. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.35.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 8 | 6.18 |
| 2025 | 30 | 5.82 |
| 2024 | 1 | 9.80 |
| 2023 | 5 | 9.40 |
It may take a day or so for new Edimax vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Edimax Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-1972 | Feb 06, 2026 |
Edimax BR-6208AC 2_1.02 auth_check_userpass2 remote auth bypass default credsA vulnerability was found in Edimax BR-6208AC 2_1.02. The affected element is the function auth_check_userpass2. Performing a manipulation of the argument Username/Password results in use of default credentials. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer. |
|
| CVE-2026-1971 | Feb 06, 2026 |
Edimax BR-6288ACL XSS via wiz_WISP24gmanual ASP before v1.12A vulnerability has been found in Edimax BR-6288ACL up to 1.12. Impacted is the function wiz_WISP24gmanual of the file wiz_WISP24gmanual.asp. Such manipulation of the argument manualssid leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer. |
|
| CVE-2026-1970 | Feb 05, 2026 |
Open-Redirect in Edimax BR-6258n v1.18 via /goform/formStaDrvSetupA flaw has been found in Edimax BR-6258n up to 1.18. This issue affects the function formStaDrvSetup of the file /goform/formStaDrvSetup. This manipulation of the argument submit-url causes open redirect. The attack can be initiated remotely. The exploit has been published and may be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer. |
|
| CVE-2020-37150 | Feb 05, 2026 |
Unauth Access to /wizard_reboot.asp Exposes SSID/Key on EW-7438RPn-v3Edimax EW-7438RPn-v3 Mini 1.27 allows unauthenticated attackers to access the /wizard_reboot.asp page in unsetup mode, which discloses the Wi-Fi SSID and security key. Attackers can retrieve the wireless password by sending a GET request to this endpoint, exposing sensitive information without authentication. |
|
| CVE-2020-37149 | Feb 05, 2026 |
CVE-2020-37149: Edimax EW-7438RPn-v3 Mini 1.27 CSRF Enables Cmd ExecEdimax EW-7438RPn-v3 Mini 1.27 is vulnerable to cross-site request forgery (CSRF) that can lead to command execution. An attacker can trick an authenticated user into submitting a crafted form to the /goform/mp endpoint, resulting in arbitrary command execution on the device with the user's privileges. |
|
| CVE-2020-37125 | Feb 05, 2026 |
Edimax EW-7438RPn-v3 Mini RCE via /goform/mp (pre1.27)Edimax EW-7438RPn-v3 Mini 1.27 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands through the /goform/mp endpoint. Attackers can exploit the vulnerability by sending crafted POST requests with command injection payloads to download and execute malicious scripts on the device. |
|
| CVE-2020-37097 | Feb 03, 2026 |
Edimax EW-7438RPn 1.13 wlencrypt_wiz.asp Info DisclosureEdimax EW-7438RPn 1.13 contains an information disclosure vulnerability that exposes WiFi network configuration details through the wlencrypt_wiz.asp file. Attackers can access the script to retrieve sensitive information including WiFi network name and plaintext password stored in device configuration variables. |
|
| CVE-2020-37096 | Feb 03, 2026 |
CrossSite Request Forgery in Edimax EW-7438RPn 1.13 MAC Filtering UIEdimax EW-7438RPn 1.13 contains a cross-site request forgery vulnerability in the MAC filtering configuration interface. Attackers can craft malicious web pages to trick users into adding unauthorized MAC addresses to the device's filtering rules without their consent. |
|
| CVE-2025-15258 | Dec 30, 2025 |
A weakness has been identified in Edimax BR-6208AC 1.02/1.03A weakness has been identified in Edimax BR-6208AC 1.02/1.03. Affected by this issue is the function formALGSetup of the file /goform/formALGSetup of the component Web-based Configuration Interface. This manipulation of the argument wlan-url causes open redirect. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. Edimax confirms this issue: "The product mentioned, EDIMAX BR-6208AC V2, has reached its End of Life (EOL) status. It is no longer supported or maintained by Edimax, and it is no longer available for purchase in the market. Consequently, there will be no further firmware updates or patches for this device. We recommend users upgrade to newer models for better security." This vulnerability only affects products that are no longer supported by the maintainer. |
|
| CVE-2025-15257 | Dec 30, 2025 |
A security flaw has been discovered in Edimax BR-6208AC 1.02/1.03A security flaw has been discovered in Edimax BR-6208AC 1.02/1.03. Affected by this vulnerability is the function formRoute of the file /gogorm/formRoute of the component Web-based Configuration Interface. The manipulation of the argument strIp/strMask/strGateway results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. Edimax confirms this issue: "The product mentioned, EDIMAX BR-6208AC V2, has reached its End of Life (EOL) status. It is no longer supported or maintained by Edimax, and it is no longer available for purchase in the market. Consequently, there will be no further firmware updates or patches for this device. We recommend users upgrade to newer models for better security." This vulnerability only affects products that are no longer supported by the maintainer. |
|
| CVE-2025-15256 | Dec 30, 2025 |
A vulnerability was identified in Edimax BR-6208AC 1.02/1.03A vulnerability was identified in Edimax BR-6208AC 1.02/1.03. Affected is the function formStaDrvSetup of the file /goform/formStaDrvSetup of the component Web-based Configuration Interface. The manipulation of the argument rootAPmac leads to command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. Edimax confirms this issue: "The product mentioned, EDIMAX BR-6208AC V2, has reached its End of Life (EOL) status. It is no longer supported or maintained by Edimax, and it is no longer available for purchase in the market. Consequently, there will be no further firmware updates or patches for this device. We recommend users upgrade to newer models for better security." This vulnerability only affects products that are no longer supported by the maintainer. |
|
| CVE-2025-14910 | Dec 19, 2025 |
Edimax BR-6208AC 1.02 FTP Daemon Path Traversal RCEA vulnerability was detected in Edimax BR-6208AC 1.02. This impacts the function handle_retr of the component FTP Daemon Service. The manipulation results in path traversal. The attack may be launched remotely. The exploit is now public and may be used. Edimax confirms this issue: "This product is no longer available in the market and has been discontinued for five years. Consequently, Edimax no longer provides technical support, firmware updates, or security patches for this specific model. However, to ensure the safety of our remaining active users, we acknowledge this report and will take the following mitigation actions: (A) We will issue an official security advisory on our support website. (B) We will strongly advise users to disable the FTP service on this device to mitigate the reported risk, by which the product will still work for common use. (C) We will recommend users upgrade to newer, supported models." This vulnerability only affects products that are no longer supported by the maintainer. |
|
| CVE-2025-14094 | Dec 05, 2025 |
Edimax BR-6478AC V3 1.0.15 Remote OS Command Injection via formSysCmdA flaw has been found in Edimax BR-6478AC V3 1.0.15. The affected element is the function sub_44CCE4 of the file /boafrm/formSysCmd. This manipulation of the argument sysCmd causes os command injection. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-14093 | Dec 05, 2025 |
Edimax BR-6478AC V3 1.0.15 OS Command Injection (formTracerouteDiagnosticRun)A vulnerability was detected in Edimax BR-6478AC V3 1.0.15. Impacted is the function sub_416990 of the file /boafrm/formTracerouteDiagnosticRun. The manipulation of the argument host results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-14092 | Dec 05, 2025 |
Edimax BR-6478AC V3 1.0.15 cmd injection via /boafrm/formDebugA security vulnerability has been detected in Edimax BR-6478AC V3 1.0.15. This issue affects the function sub_416898 of the file /boafrm/formDebugDiagnosticRun. The manipulation of the argument host leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-34029 | Jun 20, 2025 |
Command Injection in Edimax EW-7438RPn Mini v1.13 via syscmd.aspAn OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmware version 1.13 and prior via the syscmd.asp form handler. The /goform/formSysCmd endpoint exposes a system command interface through the sysCmd parameter. A remote authenticated attacker can submit arbitrary shell commands directly, resulting in command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC. |
|
| CVE-2025-34024 | Jun 20, 2025 |
Command Injection in Edimax EW-7438RPn firmware <=1.13 via /goform/mpAn OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC. |
|
| CVE-2025-45857 | May 13, 2025 |
Remote Code Execution in EDIMAX CV7428NS v1.20 via mp commandEDIMAX CV7428NS v1.20 was discovered to contain a remote code execution (RCE) vulnerability via the command parameter in the mp function. |
|
| CVE-2025-22911 | Apr 15, 2025 |
RE11S v1.11 Stack Overflow via rootAPmac in formiNICbasicREPRE11S v1.11 was discovered to contain a stack overflow via the rootAPmac parameter in the formiNICbasicREP function. |
|
| CVE-2025-28145 | Apr 15, 2025 |
Command Injection in Edimax BR-6478AC V3 1.0.15 via /boafrm/formDiskFormatEdimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3 1.0.15 was discovered to contain a command injection vulnerability via partition in /boafrm/formDiskFormat. |
|
| CVE-2025-28144 | Apr 15, 2025 |
Edimax BR-6478AC V3 Router Stack Overflow via peerPin (1.0.15)Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3 1.0.15 was discovered to contain a stack overflow vlunerability via peerPin parameter in the formWsc function. |
|
| CVE-2025-28143 | Apr 15, 2025 |
Edimax AC1200 BR-6478AC v3.1.0.15 cmd injection via /boafrm/formDiskCreateGroupEdimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3_1.0.15 was discovered to contain a command injection vulnerability via the groupname at the /boafrm/formDiskCreateGroup. |
|
| CVE-2025-28142 | Apr 15, 2025 |
Command Injection in Edimax AC1200 Router BR-6478AC /boafrm/formDiskCreateShareEdimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3_1.0.15 was discovered to contain a command injection vulnerability via the foldername in /boafrm/formDiskCreateShare. |
|
| CVE-2025-28146 | Apr 04, 2025 |
Edimax BR-6478AC 1.0.15 Cmd Injection via fota_url in /boafrmEdimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3 1.0.15 was discovered to contain a command injection vulnerability via fota_url in /boafrm/formLtefotaUpgradeQuectel |
|
| CVE-2025-1316 | Mar 05, 2025 |
IC-7100 RCE via Improper Neutralization of RequestsEdimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device |
|
| CVE-2025-1612 | Feb 24, 2025 |
Edimax BR-6288ACL 1.30 Wireless SSID XSS via wireless5g_basic.aspA vulnerability was found in Edimax BR-6288ACL 1.30. It has been declared as problematic. This vulnerability affects unknown code of the file wireless5g_basic.asp. The manipulation of the argument SSID leads to cross site scripting. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2024-48419 | Jan 27, 2025 |
Command Injection in Edimax AC1200 WiFi5 Router (v1.06) /bin/goaheadEdimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 suffers from Command Injection issues in /bin/goahead. Specifically, these issues can be triggered through /goform/tracerouteDiagnosis, /goform/pingDiagnosis, and /goform/fromSysToolPingCmd Each of these issues allows an attacker with access to the web interface to inject and execute arbitrary shell commands, with "root" privileges. |
|
| CVE-2024-48416 | Jan 27, 2025 |
Edimax BR-6476AC 1.06 Buffer Overflow via /goform/Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to Buffer Overflow via /goform/fromSetLanDhcpsClientbinding. |
|
| CVE-2024-48417 | Jan 27, 2025 |
XSS in Edimax AC1200 BR-6476AC 1.06 /goform/* EndpointsEdimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to Cross Site Scripting (XSS) in : /bin/goahead via /goform/setStaticRoute, /goform/fromSetFilterUrlFilter, and /goform/fromSetFilterClientFilter. |
|
| CVE-2024-48418 | Jan 27, 2025 |
Command Injection via /goform/fromSetDDNS on Edimax BR-6476AC 1.06In Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06, the request /goform/fromSetDDNS does not properly handle special characters in any of user provided parameters, allowing an attacker with access to the web interface to inject and execute arbitrary shell commands. |
|
| CVE-2024-48420 | Jan 27, 2025 |
Edimax AC1200 BR-6476AC 1.06 Buffer Overflow via /goform/getWifiBasicEdimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to Buffer Overflow via /goform/getWifiBasic. |
|
| CVE-2025-22907 | Jan 16, 2025 |
RE11S v1.11 Stack Overflow in formWlSiteSurveyRE11S v1.11 was discovered to contain a stack overflow via the selSSID parameter in the formWlSiteSurvey function. |
|
| CVE-2025-22916 | Jan 16, 2025 |
Stack Overflow in RE11S v1.11 via formPPPoESetup pppUserName paramRE11S v1.11 was discovered to contain a stack overflow via the pppUserName parameter in the formPPPoESetup function. |
|
| CVE-2025-22913 | Jan 16, 2025 |
CVE-2025-22913: RE11S v1.11 Stack Overflow via rootAPmac in formStaDrvSetupRE11S v1.11 was discovered to contain a stack overflow via the rootAPmac parameter in the formStaDrvSetup function. |
|
| CVE-2025-22912 | Jan 16, 2025 |
RE11S v1.11: /goform/formAccept Command Injection (CVE-2025-22912)RE11S v1.11 was discovered to contain a command injection vulnerability via the component /goform/formAccept. |
|
| CVE-2025-22906 | Jan 16, 2025 |
RE11S v1.11 Command Injection via L2TPUserName (/goform/setWAN)RE11S v1.11 was discovered to contain a command injection vulnerability via the L2TPUserName parameter at /goform/setWAN. |
|
| CVE-2025-22905 | Jan 16, 2025 |
Command injection in RE11S v1.11 via /goform/mpRE11S v1.11 was discovered to contain a command injection vulnerability via the command parameter at /goform/mp. |
|
| CVE-2025-22904 | Jan 16, 2025 |
RE11S v1.11 Stack Overflow via pptpUserName (setWAN)RE11S v1.11 was discovered to contain a stack overflow via the pptpUserName parameter in the setWAN function. |
|
| CVE-2023-49351 | Jan 16, 2024 |
Stack Buffer Overflow in Edimax BR6478AC V2 /bin/webs (v1.23)A stack-based buffer overflow vulnerability in /bin/webs binary in Edimax BR6478AC V2 firmware veraion v1.23 allows attackers to overwrite other values located on the stack due to an incorrect use of the strcpy() function. |
|
| CVE-2023-33722 | May 31, 2023 |
authenticated RCE in EDIMAX BR-6288ACL v1.12 via pppUserNameEDIMAX BR-6288ACL v1.12 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the pppUserName parameter. |
|
| CVE-2023-31986 | May 15, 2023 |
Edimax N300 Firmware: Command Injection via /bin/webs setWANA Command Injection vulnerability in Edimax Wireless Router N300 Firmware BR-6428NS_v4 allows attacker to execute arbitrary code via the setWAN function in /bin/webs without any limitations. |
|
| CVE-2023-31983 | May 12, 2023 |
Command Injection in Edimax N300 Router via /bin/websA Command Injection vulnerability in Edimax Wireless Router N300 Firmware BR-6428NS_v4 allows attacker to execute arbitrary code via the mp function in /bin/webs without any limitations. |
|
| CVE-2023-31985 | May 12, 2023 |
Edimax N300: Command Injection via /bin/webs formAcceptA Command Injection vulnerability in Edimax Wireless Router N300 Firmware BR-6428NS_v4 allows attacker to execute arbitrary code via the formAccept function in /bin/webs without any limitations. |
|
| CVE-2022-45768 | Feb 07, 2023 |
CVE-2022-45768 Command Injection via formWlanMP in Edimax N300Command Injection vulnerability in Edimax Technology Co., Ltd. Wireless Router N300 Firmware BR428nS v3 allows attacker to execute arbitrary code via the formWlanMP function. |
|
| CVE-2006-2561 | May 24, 2006 |
Edimax BR-6104K routerEdimax BR-6104K router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter (possibly within NewInternalClient), which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic. |
|