Description
A security flaw has been discovered in Edimax BR-6208AC 1.02. The impacted element is the function setWAN of the file /goform/setWAN of the component L2TP Mode. The manipulation of the argument L2TPUserName results in command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-03
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is in the setWAN function of the L2TP Mode handling in Edimax BR-6208AC firmware 1.02. An attacker can send a specially crafted L2TPUserName parameter to the /goform/setWAN endpoint, causing the firmware to shell out the unfiltered string and execute arbitrary commands. This results in complete remote command execution on the device, giving the attacker full control of the router’s operating system. The weakness is a classic command injection flaw (CWE‑74) combined with improper input validation (CWE‑77). The impact involves confidentiality, integrity, and availability of all devices behind the router as the attacker can tamper with traffic or bypass network controls.

Affected Systems

The affected product is the Edimax BR‑6208AC router. Firmware version 1.02 includes the vulnerable L2TP setWAN command. No other vendor or version strings were listed. The entry lists Edimax:BR‑6208AC as the impacted vendor/product. Users running firmware 1.02 should verify whether their devices are on that version.

Risk and Exploitability

Although the CVSS score is 5.3, the exploit is already publicly available and was published by the community. No EPSS score is listed, implying the estimate is unavailable but considering the exploit was released, the probability of exploitation is non‑trivial. The attack vector would be remote, via the L2TP interface exposed on the router’s management web server. The impact is high in terms of potential damage. The vulnerability is not currently catalogued in the CISA KEV list, but due to its remote execution nature, it should be treated as a significant risk.

Generated by OpenCVE AI on May 3, 2026 at 07:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an official firmware patch from Edimax when released.
  • If a patch is unavailable, block or restrict remote access to the /goform/setWAN endpoint or disable remote management of L2TP entirely.
  • Implement firewall or VLAN rules to limit management access to local IP ranges and block the web interface port from external networks.
  • Monitor device logs for anomalous input to the L2TPUserName field and investigate suspicious activity.

Generated by OpenCVE AI on May 3, 2026 at 07:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 03 May 2026 07:45:00 +0000

Type Values Removed Values Added
First Time appeared Edimax br-6208ac
Vendors & Products Edimax br-6208ac

Sun, 03 May 2026 06:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Edimax BR-6208AC 1.02. The impacted element is the function setWAN of the file /goform/setWAN of the component L2TP Mode. The manipulation of the argument L2TPUserName results in command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Edimax BR-6208AC L2TP Mode setWAN command injection
First Time appeared Edimax
Edimax br-6208ac Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:edimax:br-6208ac_firmware:*:*:*:*:*:*:*:*
Vendors & Products Edimax
Edimax br-6208ac Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Edimax Br-6208ac Br-6208ac Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-03T06:15:09.912Z

Reserved: 2026-05-02T11:05:13.164Z

Link: CVE-2026-7682

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-03T07:16:24.807

Modified: 2026-05-03T07:16:24.807

Link: CVE-2026-7682

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-03T07:45:16Z

Weaknesses