Описание
An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user.
An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-34024
- https://vulncheck.com/advisories/edimax-ew-7438rpn-command-injections
- https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=32163
- https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini
- https://www.exploit-db.com/exploits/48377
EPSS
9.4 Critical
CVSS4
8.8 High
CVSS3
CVE ID
Дефекты
Связанные уязвимости
An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC.
Уязвимость микропрограммного обеспечения усилителей беспроводного сигнала Edimax EW-7438RPn Mini связана с недостаточной проверкой входных данных, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
EPSS
9.4 Critical
CVSS4
8.8 High
CVSS3