Description
A vulnerability was detected in Edimax EW-7438RPn up to 1.31. This affects the function formWizSurvey of the file /goform/formWizSurvey of the component webs. Performing a manipulation of the argument ssid/manualssid/ip/mask/gateway results in buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-24
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A buffer overflow exists in the formWizSurvey handler of the Edimax EW-7438RPn router, triggered when an attacker manipulates ssid/manualssid/ip/mask/gateway parameters. The flaw allows remote exploitation and could lead to code execution on the device, exposing confidentiality, integrity, and availability. The vulnerability is categorized as CWE‑119 and CWE‑120 and is evaluated with a CVSS score of 8.7.

Affected Systems

The flaw affects Edimax EW‑7438RPn routers running firmware versions up to 1.31. The router’s web interface component "webs" exposes the vulnerable endpoint /goform/formWizSurvey.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity, and the lack of an EPSS value means current exploitation probability is unknown, though a public exploit is available. The vulnerability is not listed in the CISA KEV catalog. Attackers can reach the vulnerable interface remotely, and the flaw can be exploited by sending crafted requests to the device’s web form.

Generated by OpenCVE AI on May 24, 2026 at 02:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Edimax that addresses the formWizSurvey buffer overflow.
  • If the update is unavailable, restrict external access to the device’s web interface or place the router behind a firewall that blocks public exposure.
  • Monitor device logs for abnormal requests to /goform/formWizSurvey and implement network intrusion detection to detect exploitation attempts.
  • Enforce strong authentication and consider disabling unused web services.

Generated by OpenCVE AI on May 24, 2026 at 02:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 24 May 2026 01:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Edimax EW-7438RPn up to 1.31. This affects the function formWizSurvey of the file /goform/formWizSurvey of the component webs. Performing a manipulation of the argument ssid/manualssid/ip/mask/gateway results in buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Edimax EW-7438RPn webs formWizSurvey buffer overflow
First Time appeared Edimax
Edimax ew-7438rpn
Weaknesses CWE-119
CWE-120
CPEs cpe:2.3:a:edimax:ew-7438rpn:*:*:*:*:*:*:*:*
Vendors & Products Edimax
Edimax ew-7438rpn
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Edimax Ew-7438rpn
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-24T00:15:09.574Z

Reserved: 2026-05-23T08:32:23.833Z

Link: CVE-2026-9345

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-24T02:30:05Z

Weaknesses