← Back to CVEs
CVE-2025-34024
HIGH8.8
Description
An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published6/20/2025
Last Modified11/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
edimax:ew-7438rpn_miniedimax:ew-7438rpn_mini_firmware
Weaknesses (CWE)
CWE-78
References
https://vulncheck.com/advisories/edimax-ew-7438rpn-command-injections(disclosure@vulncheck.com)
https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=32163(disclosure@vulncheck.com)
https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/48377(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.