Impact
A command injection flaw exists in the formEZCHNwlanSetu POST request handler of Edimax EW-7438RPn firmware 1.12, allowing an attacker to manipulate the method argument and execute arbitrary shell commands on the device. The CVE description confirms that remote exploitation is possible and that the exploitation method is public.
Affected Systems
The vulnerability affects Edimax EW-7438RPn routers running firmware version 1.12, as indicated by the provided CPE string and vendor/product information. No other versions or models are mentioned.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a remote web client or automated tool sending a crafted POST request to the /goform/formEZCHNwlanSetu endpoint, which is inferred from the description of the affected POST request handler.
OpenCVE Enrichment