Impact
The Edimax GS-5008PL firmware up to and including version 1.00.54 transmits web‑management credentials and configuration data over cleartext HTTP. Because the interface does not implement TLS or SSL, any traffic sent between the device and an administrator is exposed to attackers. This vulnerability, identified as CWE‑319, enables an attacker to capture administrator usernames and passwords, as well as sensitive configuration information, potentially allowing further compromise of the device or any network it is connected to.
Affected Systems
The affected product is the Edimax GS‑5008PL switch manufactured by Edimax Technology Co., Ltd. All firmware releases 1.00.54 and earlier are vulnerable; the exact firmware versions are listed in the vendor’s documentation and the advisory references.
Risk and Exploitability
The CVSS base score is 8.7 (High), indicating substantial impact if exploited. The EPSS score is reported to be less than 1 %, suggesting that exploitation is currently unlikely but not impossible, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is local network access; an adversary who can observe traffic on the same LAN segment or intercept management traffic (for example by ARP spoofing) can exploit the flaw. Successful exploitation results in credential theft and exposure of configuration data, leading to potential lateral movement or device takeover.
OpenCVE Enrichment