Description
A vulnerability was found in Edimax EW-7438RPn up to 1.31. Affected by this vulnerability is an unknown functionality of the file /goform/mp of the component webs. The manipulation of the argument webs results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-24
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A vulnerable function in Edimax EW-7438RPn, firmware versions up to 1.31, allows an attacker to supply crafted data to the /goform/mp endpoint. The manipulation of the webs argument triggers a stack-based buffer overflow, which can lead to arbitrary code execution. The flaw is governed by buffer overrun weaknesses (CWE-119 and CWE-121) and is exploitable remotely with publicly available payloads.

Affected Systems

The affected device is the Edimax EW-7438RPn router. All firmware releases up to 1.31 are vulnerable; later firmware revisions are not listed as affected and are presumed patched or unaffected.

Risk and Exploitability

The CVSS assessment lists a score of 8.7, indicating high severity. EPSS information is not available, and the vulnerability is not present in the CISA KEV catalog. The exploitation path is simple: an attacker sends an HTTP request to the /goform/mp endpoint from any remote location, making the vulnerability highly accessible. Because the vendor has not released a fix, the risk remains elevated for all unpatched devices.

Generated by OpenCVE AI on May 24, 2026 at 04:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a firmware update for the Edimax EW-7438RPn that moves beyond version 1.31; if a newer version is unavailable, use the vendor’s latest patch or contact the vendor for remediation.
  • Block external HTTP requests to the /goform/mp endpoint or the web management interface by configuring a firewall or network ACL to restrict access to trusted IP addresses only.
  • If remote management is not required, disable the remote web management feature in the router’s settings to eliminate the attack surface.

Generated by OpenCVE AI on May 24, 2026 at 04:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 24 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Edimax EW-7438RPn up to 1.31. Affected by this vulnerability is an unknown functionality of the file /goform/mp of the component webs. The manipulation of the argument webs results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Edimax EW-7438RPn webs mp stack-based overflow
First Time appeared Edimax
Edimax ew-7438rpn
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:a:edimax:ew-7438rpn:*:*:*:*:*:*:*:*
Vendors & Products Edimax
Edimax ew-7438rpn
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Edimax Ew-7438rpn
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-24T02:15:10.771Z

Reserved: 2026-05-23T08:32:33.037Z

Link: CVE-2026-9348

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-24T04:30:34Z

Weaknesses