Description
An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC.
Published: 2025-06-20
Score: 9.4 Critical
EPSS: 4.3% Low
KEV: No
Impact: Root Command Execution
Action: Patch Immediately
AI Analysis

Impact

An OS command injection flaw in the Edimax EW‑7438RPn Mini firmware allows an authenticated attacker to execute arbitrary shell commands as the root user via the mp.asp form handler. The vulnerability stems from improper validation of the "command" parameter sent to the /goform/mp endpoint, enabling injection of shell metacharacters. Successful exploitation would grant full system control, compromising confidentiality, integrity, and availability of the device and any network segments it supports.

Affected Systems

The flaw affects the Edimax EW‑7438RPn Mini devices running firmware version 1.13 and earlier. The vendor product is the Edimax EW‑7438RPn Mini wireless range extender.

Risk and Exploitability

The CVSS score of 9.4 indicates a critical severity, while an EPSS score of 4% suggests a moderate probability that the vulnerability will be exploited within the next months. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authentication to the device, and the attacker must send crafted requests to the /goform/mp endpoint. Because the command is executed with root privileges, a single successful request provides complete control over the system.

Generated by OpenCVE AI on April 28, 2026 at 01:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware upgrade from Edimax that removes the vulnerability (upgrade to a version newer than 1.13).
  • If no updated firmware is available, block external access to the device by configuring your network firewall to allow traffic to the /goform/mp endpoint only from trusted IP addresses or internal networks.
  • Disable the mp.asp handler by limiting access or removing the associated module through device configuration, if the firmware supports it.

Generated by OpenCVE AI on April 28, 2026 at 01:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18776 An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user.
History

Thu, 20 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2025-10-07 UTC. An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC.

Thu, 20 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Thu, 20 Nov 2025 15:45:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2025-10-07 UTC.
Title Edimax EW-7438RPn Mini OS Command Injection Edimax EW-7438RPn Mini OS Command Injection via mp.asp

Wed, 19 Nov 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Edimax ew-7438rpn Mini V2
CPEs cpe:2.3:h:edimax:ew-7438rpn_mini_v2:*:*:*:*:*:*:*:*
Vendors & Products Edimax ew-7438rpn Mini V2

Tue, 23 Sep 2025 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Edimax ew-7438rpn Mini Firmware
CPEs cpe:2.3:h:edimax:ew-7438rpn_mini:-:*:*:*:*:*:*:*
cpe:2.3:o:edimax:ew-7438rpn_mini_firmware:*:*:*:*:*:*:*:*
Vendors & Products Edimax ew-7438rpn Mini Firmware
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 23 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Jun 2025 19:00:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user.
Title Edimax EW-7438RPn Mini OS Command Injection
Weaknesses CWE-20
CWE-78
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Edimax Ew-7438rpn Mini Ew-7438rpn Mini Firmware Ew-7438rpn Mini V2
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:09:03.411Z

Reserved: 2025-04-15T19:15:22.545Z

Link: CVE-2025-34024

cve-icon Vulnrichment

Updated: 2025-06-23T20:39:52.994Z

cve-icon NVD

Status : Modified

Published: 2025-06-20T19:15:37.053

Modified: 2025-11-20T22:15:55.127

Link: CVE-2025-34024

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T01:30:17Z

Weaknesses