Description
A weakness has been identified in Edimax EW-7438RPn up to 1.31. The affected element is the function formWpsStart of the file /goform/formWpsStart of the component webs. This manipulation of the argument pinCode causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-23
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw consists of an OS command injection in the pinCode argument of the formWpsStart function inside the component webs of the Edimax EW-7438RPn router. An attacker who can reach the device over the network can send a crafted request to /goform/formWpsStart and cause the router to execute arbitrary shell commands. This results in full compromise of the device, allowing the attacker to read or modify any data stored on the router, disrupt its network services, or use it as a pivot point for further attacks.

Affected Systems

All Edimax EW-7438RPn models with firmware up to and including version 1.31 are affected. The vulnerability is present in the firmware file /goform/formWpsStart and can impact any router that exposes the administrator interface to the attacker's network.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, yet the vulnerability permits remote exploitation without authentication. EPSS data is unavailable, and the flaw is not listed in the CISA KEV catalog. The attack vector is purely remote, requiring network access to the router. Because the vendor has not released a patch and the exploit is publicly available, the risk of exploitation remains significant for exposed devices.

Generated by OpenCVE AI on May 24, 2026 at 00:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the device to the latest firmware version released by Edimax that removes the command injection vulnerability. If a newer firmware is not available, contact the vendor for a fix or request a temporary release.
  • Restrict external access to the router’s web interface by using firewall rules, VPNs, or ACLs so that only trusted internal hosts can reach the /goform endpoint. Disable WPS if it is not needed, as the injection occurs when the WPS Start command is invoked.
  • Monitor router logs for unexpected formWpsStart requests and disable or quarantine devices that show suspicious activity. Consider segmenting the network to isolate router management traffic from the general user traffic.

Generated by OpenCVE AI on May 24, 2026 at 00:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 23 May 2026 23:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Edimax EW-7438RPn up to 1.31. The affected element is the function formWpsStart of the file /goform/formWpsStart of the component webs. This manipulation of the argument pinCode causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Edimax EW-7438RPn webs formWpsStart os command injection
First Time appeared Edimax
Edimax ew-7438rpn
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:a:edimax:ew-7438rpn:*:*:*:*:*:*:*:*
Vendors & Products Edimax
Edimax ew-7438rpn
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Edimax Ew-7438rpn
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-23T22:45:10.250Z

Reserved: 2026-05-23T08:32:18.217Z

Link: CVE-2026-9343

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-24T02:15:32Z

Weaknesses