Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 05 Mar 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:edimax:ew-7438rpn_mini_firmware:1.23:*:*:*:*:*:*:* |
Wed, 18 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Edimax ew-7438rpn Mini Firmware
|
|
| CPEs | cpe:2.3:h:edimax:ew-7438rpn_mini:3:*:*:*:*:*:*:* cpe:2.3:o:edimax:ew-7438rpn_mini_firmware:1.27:*:*:*:*:*:*:* |
|
| Vendors & Products |
Edimax ew-7438rpn Mini Firmware
|
Fri, 06 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Edimax
Edimax ew-7438rpn Mini |
|
| Vendors & Products |
Edimax
Edimax ew-7438rpn Mini |
Thu, 05 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Edimax EW-7438RPn-v3 Mini 1.27 is vulnerable to cross-site request forgery (CSRF) that can lead to command execution. An attacker can trick an authenticated user into submitting a crafted form to the /goform/mp endpoint, resulting in arbitrary command execution on the device with the user's privileges. | |
| Title | Edimax Technology EW-7438RPn-v3 Mini 1.27 - Cross-Site Request Forgery (CSRF) to Command Execution | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:28:15.174Z
Reserved: 2026-02-03T16:27:45.309Z
Link: CVE-2020-37149
Updated: 2026-02-05T17:26:15.904Z
Status : Analyzed
Published: 2026-02-05T17:16:10.567
Modified: 2026-02-18T18:09:12.933
Link: CVE-2020-37149
No data.
OpenCVE Enrichment
Updated: 2026-02-06T12:05:21Z