Description
A vulnerability was found in Edimax BR-6208AC 2_1.02. The affected element is the function auth_check_userpass2. Performing a manipulation of the argument Username/Password results in use of default credentials. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-02-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access due to default credentials in the authentication function
Action: Mitigate Now
AI Analysis

Impact

The flaw involves the auth_check_userpass2 function, which accepts a hard‑coded credential set. By sending a crafted username/password pair the device authenticates using the default credentials, allowing an attacker to gain privileged access. The weakness is classed as CWE‑1392. An attacker who succeeds can observe or modify device configuration, potentially enabling further compromise.

Affected Systems

Edimax BR‑6208AC routers running firmware 2_1.02 are affected. The vendor has declared the product end‑of‑life and will not release a patch. Devices may also be found running earlier 2.0 firmware versions, but only the 2_1.02 release has confirmed vulnerability.

Risk and Exploitability

The CVSS baseline is 6.9, indicating a moderate severity, while EPSS below 1% shows a very low probability of exploitation but still feasible due to the public exploit. The vulnerability has not been listed in the CISA KEV catalog. Remote attackers with network access to the device can exploit the weakness without authentication, so the attack surface is wide. Because a vendor fix is unavailable, the risk remains elevated for any remaining units in production.

Generated by OpenCVE AI on April 17, 2026 at 22:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Place the router behind a firewall or intranet segment and block unnecessary inbound traffic, limiting management access to trusted hosts only.
  • Immediately replace the default username and password during device configuration, choosing a strong, unique password for each interface.
  • If the device remains in use, consider retiring it and provisioning a supported replacement from a vendor that actively releases firmware updates.

Generated by OpenCVE AI on April 17, 2026 at 22:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Edimax br-6208ac Firmware
CPEs cpe:2.3:h:edimax:br-6208ac:2.0:*:*:*:*:*:*:*
cpe:2.3:o:edimax:br-6208ac_firmware:*:*:*:*:*:*:*:*
Vendors & Products Edimax br-6208ac Firmware

Sat, 07 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Edimax
Edimax br-6208ac
Vendors & Products Edimax
Edimax br-6208ac

Fri, 06 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Edimax BR-6208AC 2_1.02. The affected element is the function auth_check_userpass2. Performing a manipulation of the argument Username/Password results in use of default credentials. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.
Title Edimax BR-6208AC auth_check_userpass2 default credentials
Weaknesses CWE-1392
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Edimax Br-6208ac Br-6208ac Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:19:31.030Z

Reserved: 2026-02-05T13:19:55.727Z

Link: CVE-2026-1972

cve-icon Vulnrichment

Updated: 2026-02-06T19:31:17.428Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T02:16:04.633

Modified: 2026-02-20T15:20:01.763

Link: CVE-2026-1972

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:00:12Z

Weaknesses