Description
A vulnerability has been found in Edimax EW-7438RPn up to 1.31. Affected is the function formWizSurvey of the file /goform/formWizSurvey of the component webs. The manipulation of the argument ip/mask/gateway leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A command injection flaw exists in the formWizSurvey page of the Edimax EW‑7438RPn router, triggered by manipulating the ip/mask/gateway parameters. The flaw permits an unauthenticated attacker to inject and execute arbitrary operating‑system commands on the device. If exploited, an attacker could gain full control, compromise confidentiality, integrity, and availability of the router, and potentially use the device as a foothold for further network attacks.

Affected Systems

The vulnerability affects Edimax EW‑7438RPn routers running firmware versions up to 1.31. No other hardware or software is listed as impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. The EPSS score is not available, and the issue is not listed in CISA’s KEV catalog. Exploitation code has been publicly disclosed, and the vulnerability can be triggered remotely via the router’s web interface, making it exploitable by attackers who can reach the device over the network.

Generated by OpenCVE AI on May 24, 2026 at 03:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Block inbound HTTP traffic to the /goform/formWizSurvey endpoint on the device using firewall or router ACLs.
  • Restrict management access to the router to a trusted internal network or VPN only, and remove default credentials.
  • When a firmware update addressing this flaw becomes available from Edimax, apply the update immediately.

Generated by OpenCVE AI on May 24, 2026 at 03:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 24 May 2026 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Edimax EW-7438RPn up to 1.31. Affected is the function formWizSurvey of the file /goform/formWizSurvey of the component webs. The manipulation of the argument ip/mask/gateway leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Edimax EW-7438RPn webs formWizSurvey os command injection
First Time appeared Edimax
Edimax ew-7438rpn
Weaknesses CWE-77
CWE-78
CPEs cpe:2.3:a:edimax:ew-7438rpn:*:*:*:*:*:*:*:*
Vendors & Products Edimax
Edimax ew-7438rpn
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Edimax Ew-7438rpn
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-24T01:30:10.190Z

Reserved: 2026-05-23T08:32:29.755Z

Link: CVE-2026-9347

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-24T07:00:11Z

Weaknesses