Description
EDIMAX BR-6428nS V3 1.15 is vulnerable to Command Injection. An authenticated attacker with access to the network can submit crafted input to the WLAN configuration functionality. Due to insufficient input validation, the attacker is able to execute arbitrary system commands on the device.
Published: 2026-05-11
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A firmware vulnerability in EDIMAX BR‑6428nS V3 1.15 permits an authenticated attacker on the local network to send specially crafted input to the WLAN configuration interface. Because input validation is insufficient, the attacker can inject system commands, a classic command‑injection flaw (CWE‑77), gaining the ability to execute arbitrary code on the device and compromise its integrity. The flaw does not, however, provide a direct attack path from outside the local network.

Affected Systems

The affected device is the EDIMAX BR‑6428nS router running firmware version 1.15. No other vendors or product variants are listed in the CNA data. Users of this router should confirm that they are deploying the listed build and be aware that no firmware older than 1.15 or alternative model numbers have been reported as vulnerable.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity, while the EPSS score of less than 1 % reflects a very low historical exploitation probability. The vulnerability requires local authentication, implying that an attacker must already have network access or compromised a local user account. Because the flaw is not listed in CISA KEV, no confirmed public exploits exist yet, but the potential for destructive impact warrants prompt attention.

Generated by OpenCVE AI on May 12, 2026 at 19:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router to a firmware release that contains the remediation for the command‑injection flaw.
  • Restrict access to the WLAN configuration interface by disabling the service or limiting it to trusted internal hosts via firewall rules.
  • Segregate the router’s management network from public or guest networks to reduce the attack surface.
  • Enable comprehensive logging of configuration changes and monitor for anomalous activity on the device.

Generated by OpenCVE AI on May 12, 2026 at 19:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 20:00:00 +0000

Type Values Removed Values Added
Title Authenticated Command Injection in EDIMAX BR‑6428nS Router Firmware 1.15

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Title Command Injection in EDIMAX BR-6428nS Firmware 1.15 Enables Arbitrary System Commands
Weaknesses CWE-78

Tue, 12 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 11 May 2026 23:30:00 +0000

Type Values Removed Values Added
Title Command Injection in EDIMAX BR-6428nS Firmware 1.15 Enables Arbitrary System Commands
Weaknesses CWE-78

Mon, 11 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Edimax
Edimax br-6428ns
Vendors & Products Edimax
Edimax br-6428ns

Mon, 11 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description EDIMAX BR-6428nS V3 1.15 is vulnerable to Command Injection. An authenticated attacker with access to the network can submit crafted input to the WLAN configuration functionality. Due to insufficient input validation, the attacker is able to execute arbitrary system commands on the device.
References

Subscriptions

Edimax Br-6428ns
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-12T13:37:55.459Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-36734

cve-icon Vulnrichment

Updated: 2026-05-12T13:37:44.249Z

cve-icon NVD

Status : Received

Published: 2026-05-11T20:25:41.563

Modified: 2026-05-12T14:17:02.370

Link: CVE-2026-36734

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T19:45:15Z

Weaknesses