Ew 7438rpn Mini Firmware Edimax Ew 7438rpn Mini Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Edimax Ew 7438rpn Mini Firmware.

By the Year

In 2026 there have been 5 vulnerabilities in Edimax Ew 7438rpn Mini Firmware with an average score of 7.6 out of ten.

Year Vulnerabilities Average Score
2026 5 7.64

It may take a day or so for new Ew 7438rpn Mini Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Edimax Ew 7438rpn Mini Firmware Security Vulnerabilities

Unauth Access to /wizard_reboot.asp Exposes SSID/Key on EW-7438RPn-v3
CVE-2020-37150 7.5 - High - February 05, 2026

Edimax EW-7438RPn-v3 Mini 1.27 allows unauthenticated attackers to access the /wizard_reboot.asp page in unsetup mode, which discloses the Wi-Fi SSID and security key. Attackers can retrieve the wireless password by sending a GET request to this endpoint, exposing sensitive information without authentication.

Insertion of Sensitive Information Into Sent Data

CVE-2020-37149: Edimax EW-7438RPn-v3 Mini 1.27 CSRF Enables Cmd Exec
CVE-2020-37149 8.1 - High - February 05, 2026

Edimax EW-7438RPn-v3 Mini 1.27 is vulnerable to cross-site request forgery (CSRF) that can lead to command execution. An attacker can trick an authenticated user into submitting a crafted form to the /goform/mp endpoint, resulting in arbitrary command execution on the device with the user's privileges.

Session Riding

Edimax EW-7438RPn-v3 Mini RCE via /goform/mp (pre1.27)
CVE-2020-37125 9.8 - Critical - February 05, 2026

Edimax EW-7438RPn-v3 Mini 1.27 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands through the /goform/mp endpoint. Attackers can exploit the vulnerability by sending crafted POST requests with command injection payloads to download and execute malicious scripts on the device.

Shell injection

CrossSite Request Forgery in Edimax EW-7438RPn 1.13 MAC Filtering UI
CVE-2020-37096 5.3 - Medium - February 03, 2026

Edimax EW-7438RPn 1.13 contains a cross-site request forgery vulnerability in the MAC filtering configuration interface. Attackers can craft malicious web pages to trick users into adding unauthorized MAC addresses to the device's filtering rules without their consent.

Session Riding

Edimax EW-7438RPn 1.13 wlencrypt_wiz.asp Info Disclosure
CVE-2020-37097 7.5 - High - February 03, 2026

Edimax EW-7438RPn 1.13 contains an information disclosure vulnerability that exposes WiFi network configuration details through the wlencrypt_wiz.asp file. Attackers can access the script to retrieve sensitive information including WiFi network name and plaintext password stored in device configuration variables.

Insufficiently Protected Credentials

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Edimax Ew 7438rpn Mini Firmware or by Edimax? Click the Watch button to subscribe.

Edimax
Vendor

subscribe