Impact
A buffer overflow exists in the formwlencrypt24g POST request handler of Edimax EW-7438RPn firmware 1.28a. The vulnerability arises when an attacker supplies a specially crafted key1 value, allowing them to overwrite memory and potentially execute arbitrary code. The flaw is classified as a buffer overflow (CWE-119) and corresponds to an overflow of a buffer (CWE-120), which can compromise confidentiality, integrity, and availability of the device.
Affected Systems
Edimax EW-7438RPn wireless routers running firmware version 1.28a are affected. The flaw is located in the HTTP POST endpoint /goform/formwlencrypt24g within the POST Request Handler component. No other firmware versions are listed as affected.
Risk and Exploitability
The CVSS base score of 8.7 indicates high severity, and the attack can be performed remotely over the network. Publicly available exploits have been released, and the vulnerability is not yet tracked in the CISA KEV list. With no vendor patch currently available, the risk remains high. An attacker can trigger the overflow by sending a crafted HTTP POST request to the vulnerable endpoint, potentially gaining arbitrary code execution on the device.
OpenCVE Enrichment