Impact
A vulnerable function in Edimax EW-7438RPn, firmware versions up to 1.31, allows an attacker to supply crafted data to the /goform/mp endpoint. The manipulation of the webs argument triggers a stack-based buffer overflow, which can lead to arbitrary code execution. The flaw is governed by buffer overrun weaknesses (CWE-119 and CWE-121) and is exploitable remotely with publicly available payloads.
Affected Systems
The affected device is the Edimax EW-7438RPn router. All firmware releases up to 1.31 are vulnerable; later firmware revisions are not listed as affected and are presumed patched or unaffected.
Risk and Exploitability
The CVSS assessment lists a score of 8.7, indicating high severity. EPSS information is not available, and the vulnerability is not present in the CISA KEV catalog. The exploitation path is simple: an attacker sends an HTTP request to the /goform/mp endpoint from any remote location, making the vulnerability highly accessible. Because the vendor has not released a fix, the risk remains elevated for all unpatched devices.
OpenCVE Enrichment