Description
A vulnerability was detected in Edimax BR-6208AC 1.02. This impacts the function handle_retr of the component FTP Daemon Service. The manipulation results in path traversal. The attack may be launched remotely. The exploit is now public and may be used. Edimax confirms this issue: "This product is no longer available in the market and has been discontinued for five years. Consequently, Edimax no longer provides technical support, firmware updates, or security patches for this specific model. However, to ensure the safety of our remaining active users, we acknowledge this report and will take the following mitigation actions: (A) We will issue an official security advisory on our support website. (B) We will strongly advise users to disable the FTP service on this device to mitigate the reported risk, by which the product will still work for common use. (C) We will recommend users upgrade to newer, supported models." This vulnerability only affects products that are no longer supported by the maintainer.
Problem types
Product status
Timeline
| 2025-12-18: | Advisory disclosed |
| 2025-12-18: | VulDB entry created |
| 2025-12-18: | VulDB entry last update |
Credits
tian (VulDB User)
References
vuldb.com/?id.337435 (VDB-337435 | Edimax BR-6208AC FTP Daemon Service handle_retr path traversal)
vuldb.com/?ctiid.337435 (VDB-337435 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.713704 (Submit #713704 | Edimax BR-6208AC V2_1.02 Absolute Path Traversal)
tzh00203.notion.site/...0fb8812f7d510abf558?source=copy_link
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.