Description
A security vulnerability has been detected in Edimax BR-6428NS 1.10. Affected is the function formWlbasic of the file /goform/formWlbasic of the component POST Request Handler. The manipulation of the argument repeaterSSID leads to command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists in the formWlbasic POST handler of the Edimax BR‑6428NS router firmware, where the repeaterSSID parameter is not properly sanitized. By supplying a specially crafted value, an attacker can inject operating‑system commands into the backend, allowing remote execution of arbitrary code. The impact of successful exploitation is a complete compromise of the device, undermining confidentiality, integrity, and availability, and potentially enabling the attacker to use the device as part of a larger attack surface.

Affected Systems

Edimax BR‑6428NS routers running firmware version 1.10 are affected. The defect resides in the "formWlbasic" function of the /goform/formWlbasic component of the POST Request Handler. No other versions are listed, so only firmware 1.10 is known to be vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity vulnerability. EPSS is not available, but the fact that the exposure is via a publicly reachable POST request and there is no mention of authentication suggests the attack is likely unauthenticated and could be triggered from any network capable of reaching the web interface. The vulnerability is not cataloged in CISA KEV, yet the public disclosure and lack of vendor response make it a realistic threat at this time.

Generated by OpenCVE AI on May 23, 2026 at 11:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Edimax that addresses the formWlbasic command injection vulnerability. If no patch is available, report the issue to Edimax and seek a temporary fix.
  • Restrict management interface access by placing the router behind a firewall or VLAN and allow traffic to /goform/formWlbasic only from trusted IP addresses, effectively blocking unauthenticated POST requests.
  • Enable logging on the device and monitor for anomalous POST requests to the repeaterSSID endpoint; set alerts for repeated attempts to detect possible exploitation attempts.

Generated by OpenCVE AI on May 23, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 23 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Edimax br-6428ns
Vendors & Products Edimax br-6428ns

Sat, 23 May 2026 10:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Edimax BR-6428NS 1.10. Affected is the function formWlbasic of the file /goform/formWlbasic of the component POST Request Handler. The manipulation of the argument repeaterSSID leads to command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Edimax BR-6428NS POST Request formWlbasic command injection
First Time appeared Edimax
Edimax br-6428ns Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:edimax:br-6428ns_firmware:*:*:*:*:*:*:*:*
Vendors & Products Edimax
Edimax br-6428ns Firmware
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Edimax Br-6428ns Br-6428ns Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-23T10:15:09.101Z

Reserved: 2026-05-22T17:38:45.357Z

Link: CVE-2026-9297

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-23T11:30:16Z

Weaknesses