Impact
The vulnerability exists in the formAccept function of the /goform/formAccep endpoint on Edimax EW‑7438RPn routers. An attacker can tamper with the submit‑url parameter to inject arbitrary shell commands, resulting in command execution on the device. The flaw is a classic command injection (CWE‑77) that can be triggered via a POST request to the web interface, allowing remote control without local privileges.
Affected Systems
Edimax EW‑7438RPn routers running firmware version 1.12 are affected. This is the only publicly documented version with the vulnerability; other firmware releases have not been listed or verified as vulnerable.
Risk and Exploitability
The CVSS base score is 5.3, indicating a moderate severity. No EPSS score is available, and the issue is not listed in the CISA KEV catalog, suggesting that widespread exploitation has not yet been confirmed. However, an exploit is publicly documented and the attack can be launched remotely by sending a crafted POST request to the vulnerable endpoint. The risk of exploitation remains moderate to high until a patch is applied or the vulnerable functionality is disabled.
OpenCVE Enrichment