Impact
Edimax EW-7438RPn firmware 1.28a contains a flaw in the /goform/formHwSet POST handler that allows an attacker to inject arbitrary shell commands by manipulating several form fields such as Anntena, regDomain, and wifi settings. The injection capability permits execution of operating system commands with the privileges of the web server process, potentially compromising the device’s confidentiality, integrity, and availability. The vulnerability is identified as CMD_INJECTION (CWE-74) combined with improper access control (CWE-77).
Affected Systems
The flaw is present in the Edimax EW-7438RPn Wi‑Fi router model running firmware version 1.28a. No other model or firmware version is currently listed as affected.
Risk and Exploitability
The CVSS base score is 5.3, indicating moderate severity. EPSS is not available, and the vulnerability is not listed in CISA's KEV catalog. The exploit can be launched remotely through the publicly reachable web interface, and an exploit code has already been made public. Attackers can trigger the vulnerability without authentication, provided they can reach the router over the network. The high confidence in the publish of exploit code suggests that the vulnerability is actively used in the wild.
OpenCVE Enrichment