Edimax Ew 7438rpn Mini Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Edimax Ew 7438rpn Mini Firmware.
By the Year
In 2026 there have been 5 vulnerabilities in Edimax Ew 7438rpn Mini Firmware with an average score of 7.6 out of ten.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 5 | 7.64 |
It may take a day or so for new Ew 7438rpn Mini Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Edimax Ew 7438rpn Mini Firmware Security Vulnerabilities
Unauth Access to /wizard_reboot.asp Exposes SSID/Key on EW-7438RPn-v3
CVE-2020-37150
7.5 - High
- February 05, 2026
Edimax EW-7438RPn-v3 Mini 1.27 allows unauthenticated attackers to access the /wizard_reboot.asp page in unsetup mode, which discloses the Wi-Fi SSID and security key. Attackers can retrieve the wireless password by sending a GET request to this endpoint, exposing sensitive information without authentication.
Insertion of Sensitive Information Into Sent Data
CVE-2020-37149: Edimax EW-7438RPn-v3 Mini 1.27 CSRF Enables Cmd Exec
CVE-2020-37149
8.1 - High
- February 05, 2026
Edimax EW-7438RPn-v3 Mini 1.27 is vulnerable to cross-site request forgery (CSRF) that can lead to command execution. An attacker can trick an authenticated user into submitting a crafted form to the /goform/mp endpoint, resulting in arbitrary command execution on the device with the user's privileges.
Session Riding
Edimax EW-7438RPn-v3 Mini RCE via /goform/mp (pre1.27)
CVE-2020-37125
9.8 - Critical
- February 05, 2026
Edimax EW-7438RPn-v3 Mini 1.27 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands through the /goform/mp endpoint. Attackers can exploit the vulnerability by sending crafted POST requests with command injection payloads to download and execute malicious scripts on the device.
Shell injection
CrossSite Request Forgery in Edimax EW-7438RPn 1.13 MAC Filtering UI
CVE-2020-37096
5.3 - Medium
- February 03, 2026
Edimax EW-7438RPn 1.13 contains a cross-site request forgery vulnerability in the MAC filtering configuration interface. Attackers can craft malicious web pages to trick users into adding unauthorized MAC addresses to the device's filtering rules without their consent.
Session Riding
Edimax EW-7438RPn 1.13 wlencrypt_wiz.asp Info Disclosure
CVE-2020-37097
7.5 - High
- February 03, 2026
Edimax EW-7438RPn 1.13 contains an information disclosure vulnerability that exposes WiFi network configuration details through the wlencrypt_wiz.asp file. Attackers can access the script to retrieve sensitive information including WiFi network name and plaintext password stored in device configuration variables.
Insufficiently Protected Credentials
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Edimax Ew 7438rpn Mini Firmware or by Edimax? Click the Watch button to subscribe.