← Zuruck zu CVEs
CVE-2025-34024
HIGH8.8
Beschreibung
An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht6/20/2025
Zuletzt geandert11/20/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
edimax:ew-7438rpn_miniedimax:ew-7438rpn_mini_firmware
Schwachen (CWE)
CWE-78
Referenzen
https://vulncheck.com/advisories/edimax-ew-7438rpn-command-injections(disclosure@vulncheck.com)
https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=32163(disclosure@vulncheck.com)
https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/48377(disclosure@vulncheck.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.