Impact
A flaw in the Edimax BR‑6428nC router firmware (up to version 1.16) permits attackers to inject arbitrary shell commands through the pppUserName or pptpUserName parameters on the /goform/setWAN web interface. This command injection (CWE‑74) is aggravated by improper validation of user‑supplied input (CWE‑77). Based on the description, it is inferred that exploitation could execute commands with the privileges of the web service, potentially allowing full control of the router and the networks it manages.
Affected Systems
Edimax BR‑6428nC routers with firmware versions 1.16 or earlier are affected. The vulnerability is located in the /goform/setWAN endpoint of the router’s web interface.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and EPSS information is not available. However, a publicly available proof‑of‑concept has been released, enabling attackers to launch the exploit remotely over HTTP/HTTPS. While the vulnerability is not listed in the CISA KEV catalog, the ability to inject arbitrary commands from external hosts represents a tangible threat that warrants prompt remediation.
OpenCVE Enrichment