Description
A security vulnerability has been detected in Edimax EW-7438RPn 1.12. This vulnerability affects the function formConnectionSetting of the file /goform/formConnectionSetting of the component Setting Handler. Such manipulation of the argument max_Conn/timeOut leads to command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A remote command‑injection flaw exists in the formConnectionSetting endpoint of the EW‑7438RPn router firmware. When the max_Conn or timeOut parameters are manipulated, the device executes the supplied payload as a shell command, allowing an unauthenticated attacker to run arbitrary code on the device. The weakness corresponds to CWE‑74 (user input placed into executable code) and CWE‑77 (input validation failure leading to shell injection).

Affected Systems

The affected product is the Edimax EW‑7438RPn router running firmware version 1.12. No additional product variants or version ranges are listed, so only the specified firmware instance is known to be vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity flaw, but the EPSS score is not available, so the current exploitation likelihood is unknown while the vulnerability is known to be exploitable. The exploit has been disclosed publicly and may be used. The device is not included in CISA’s KEV list, suggesting no confirmed widespread exploitation at this time. The attack vector is remote over the HTTP interface, and no authentication is required, making the risk significant for exposed devices. The vendor did not respond to early disclosure, and no patch is currently available.

Generated by OpenCVE AI on May 24, 2026 at 08:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Block external access to the router’s administrative interface with a firewall or access‑control list.
  • Disable or restrict access to the /goform/formConnectionSetting endpoint, for example by configuring the device to require authentication or using a local network firewall.
  • Apply the latest firmware once a vendor patch is released, and test the firmware’s behavior to confirm that the injection point is closed.
  • Monitor system logs for abnormal command execution attempts or unexpected traffic to the formConnectionSetting endpoint.

Generated by OpenCVE AI on May 24, 2026 at 08:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 24 May 2026 07:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Edimax EW-7438RPn 1.12. This vulnerability affects the function formConnectionSetting of the file /goform/formConnectionSetting of the component Setting Handler. Such manipulation of the argument max_Conn/timeOut leads to command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Edimax EW-7438RPn Setting formConnectionSetting command injection
First Time appeared Edimax
Edimax ew-7438rpn
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:a:edimax:ew-7438rpn:*:*:*:*:*:*:*:*
Vendors & Products Edimax
Edimax ew-7438rpn
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Edimax Ew-7438rpn
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-24T07:00:11.347Z

Reserved: 2026-05-23T09:58:35.402Z

Link: CVE-2026-9362

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-24T08:30:05Z

Weaknesses