Impact
A flaw in the formStaDrvSetup web interface of the Edimax BR‑6258n router allows an attacker to manipulate the submit‑url argument and trigger an open redirect, enabling malicious sites to be loaded in the context of the device’s web management console. This constitutes a CWE‑601 weakness that can be exploited remotely. While it does not provide direct code execution, the redirect can assist phishing or facilitate other social‑engineering attacks against users of the device.
Affected Systems
The affected product is the Edimax BR‑6258n router, firmware versions up to and including 1.18. The product is end‑of‑life and the vendor has not released a patch, only announcing that a consolidated security advisory will be posted on their support site.
Risk and Exploitability
The vulnerability has a CVSS score of 5.1, indicating moderate severity, and an EPSS score of less than 1 %, reflecting a low likelihood of exploitation. It is not listed in the CISA KEV catalog. The attacker can craft a URL that calls the vulnerable form and, without any user input after submission, redirects the browser to an arbitrary target. Because the attack vector is remote via HTTP access to the router’s management interface, unrestricted access to the device amplifies risk.
OpenCVE Enrichment