Impact
The vulnerability lies in the formStaDrvSetup endpoint of the router's web interface. An attacker can inject arbitrary shell commands by manipulating the stadrv_ssid parameter sent via an HTTP POST request. This leads to remote command execution on the device. The weakness is a classic command‑injection flaw classified as CWE‑74 and CWE‑77.
Affected Systems
Affected is the Edimax BR‑6428NS router running firmware version 1.10. The CVE applies to all devices carrying that firmware build because the vulnerable code resides in the /goform/formStaDrvSetup API.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity. The EPSS score is not available, and the vulnerability has not yet entered the CISA KEV catalog. Exploitation is possible over the internet, and public proof‑of‑concept code exists. Attackers only need to send a crafted POST request to the vulnerable endpoint; no local or privileged access prerequisites are required.
OpenCVE Enrichment