Home

Description

Edimax EW-7438RPn-v3 Mini 1.27 allows unauthenticated attackers to access the /wizard_reboot.asp page in unsetup mode, which discloses the Wi-Fi SSID and security key. Attackers can retrieve the wireless password by sending a GET request to this endpoint, exposing sensitive information without authentication.

PUBLISHED Reserved 2026-02-03 | Published 2026-02-05 | Updated 2026-02-05 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Insertion of Sensitive Information Into Sent Data

Product status

1.23
affected

1.27
affected

Credits

Wadeek finder

References

www.exploit-db.com/exploits/48318 (ExploitDB-48318) exploit

www.edimax.com/...i-fi_range_extenders_n300/ew-7438rpn_mini/ (Edimax EW-7438RPn Mini Product Page) product

www.vulncheck.com/...orized-access-wi-fi-password-disclosure (VulnCheck Advisory: Edimax Technology EW-7438RPn-v3 Mini 1.27 - Unauthorized Access: Wi-Fi Password Disclosure) third-party-advisory

cve.org (CVE-2020-37150)

nvd.nist.gov (CVE-2020-37150)

Download JSON