Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18776 | An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 20 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2025-10-07 UTC. | An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC. |
Thu, 20 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 |
Thu, 20 Nov 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. | An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2025-10-07 UTC. |
| Title | Edimax EW-7438RPn Mini OS Command Injection | Edimax EW-7438RPn Mini OS Command Injection via mp.asp |
Wed, 19 Nov 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Edimax ew-7438rpn Mini V2
|
|
| CPEs | cpe:2.3:h:edimax:ew-7438rpn_mini_v2:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Edimax ew-7438rpn Mini V2
|
Tue, 23 Sep 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Edimax ew-7438rpn Mini Firmware
|
|
| CPEs | cpe:2.3:h:edimax:ew-7438rpn_mini:-:*:*:*:*:*:*:* cpe:2.3:o:edimax:ew-7438rpn_mini_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Edimax ew-7438rpn Mini Firmware
|
|
| Metrics |
cvssV3_1
|
Mon, 23 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Jun 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. | |
| Title | Edimax EW-7438RPn Mini OS Command Injection | |
| Weaknesses | CWE-20 CWE-78 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-20T21:24:54.654Z
Reserved: 2025-04-15T19:15:22.545Z
Link: CVE-2025-34024
Updated: 2025-06-23T20:39:52.994Z
Status : Modified
Published: 2025-06-20T19:15:37.053
Modified: 2025-11-20T22:15:55.127
Link: CVE-2025-34024
No data.
OpenCVE Enrichment
Updated: 2025-06-23T08:20:14Z
EUVD