Impact
The vulnerability exists in the formWlbasic POST handler of the Edimax BR‑6428NS router firmware, where the repeaterSSID parameter is not properly sanitized. By supplying a specially crafted value, an attacker can inject operating‑system commands into the backend, allowing remote execution of arbitrary code. The impact of successful exploitation is a complete compromise of the device, undermining confidentiality, integrity, and availability, and potentially enabling the attacker to use the device as part of a larger attack surface.
Affected Systems
Edimax BR‑6428NS routers running firmware version 1.10 are affected. The defect resides in the "formWlbasic" function of the /goform/formWlbasic component of the POST Request Handler. No other versions are listed, so only firmware 1.10 is known to be vulnerable.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity vulnerability. EPSS is not available, but the fact that the exposure is via a publicly reachable POST request and there is no mention of authentication suggests the attack is likely unauthenticated and could be triggered from any network capable of reaching the web interface. The vulnerability is not cataloged in CISA KEV, yet the public disclosure and lack of vendor response make it a realistic threat at this time.
OpenCVE Enrichment