Description
A vulnerability was detected in Edimax BR-6228NC 1.22. Affected by this issue is the function mp of the file /goform/mp of the component POST Request Handler. The manipulation of the argument command results in command injection. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-18
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A remote attacker can deliver a specially crafted HTTP POST request to the /goform/mp endpoint of the Edimax BR‑6228NC device. The command parameter is not properly validated, enabling arbitrary shell commands to be executed on the device. This can lead to full compromise of the device, including data exfiltration, service disruption, or use as a pivot point for further attacks. The flaw is associated with the weaknesses of improper command handling (CWE‑74) and lack of input validation for command execution (CWE‑77).

Affected Systems

Edimax BR‑6228NC routers running firmware version 1.22 are affected. No other vendors or product versions are listed as vulnerable.

Risk and Exploitability

The CVSS base score is 5.3, indicating moderate severity. EPSS data is not available, so the current exploitation probability is unknown. The vulnerability is not listed in the CISA KEV catalog, but an exploit is publicly available and can be performed from anywhere on the network that can reach the device's management interface. The attack vector is remote, exploiting the HTTP POST API exposed by the router.

Generated by OpenCVE AI on May 18, 2026 at 02:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to a version that removes the insecure /goform/mp endpoint or that implements proper input validation for the command parameter.
  • If an update is not available, isolate the device from untrusted networks and restrict inbound traffic to only required management ports, using a firewall or VLAN segmentation.
  • Configure the device to reject or sanitize input for the /goform/mp endpoint, ensuring that only allowed command values are processed and that all user input is properly escaped before being passed to the shell.

Generated by OpenCVE AI on May 18, 2026 at 02:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 18 May 2026 01:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Edimax BR-6228NC 1.22. Affected by this issue is the function mp of the file /goform/mp of the component POST Request Handler. The manipulation of the argument command results in command injection. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Edimax BR-6228NC POST Request mp command injection
First Time appeared Edimax
Edimax br-6228nc
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:a:edimax:br-6228nc:*:*:*:*:*:*:*:*
Vendors & Products Edimax
Edimax br-6228nc
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Edimax Br-6228nc
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-18T10:27:06.268Z

Reserved: 2026-05-17T09:41:22.179Z

Link: CVE-2026-8774

cve-icon Vulnrichment

Updated: 2026-05-18T10:25:10.004Z

cve-icon NVD

Status : Received

Published: 2026-05-18T02:16:36.433

Modified: 2026-05-18T02:16:36.433

Link: CVE-2026-8774

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T06:00:11Z

Weaknesses