Home

Description

A vulnerability was found in Edimax BR-6208AC 2_1.02. The affected element is the function auth_check_userpass2. Performing a manipulation of the argument Username/Password results in use of default credentials. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.

PUBLISHED Reserved 2026-02-05 | Published 2026-02-06 | Updated 2026-02-23 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
5.0AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Use of Default Credentials

Product status

2_1.02
affected

Timeline

2026-02-05:Advisory disclosed
2026-02-05:VulDB entry created
2026-02-20:VulDB entry last update

Credits

tian (VulDB User) reporter

References

vuldb.com/?id.344494 (VDB-344494 | Edimax BR-6208AC auth_check_userpass2 default credentials) vdb-entry technical-description

vuldb.com/?ctiid.344494 (VDB-344494 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.744032 (Submit #744032 | Edimax BR-6208AC V2_1.02 Weak Authentication) third-party-advisory

tzh00203.notion.site/...01c9645dd5261717901?source=copy_link exploit

cve.org (CVE-2026-1972)

nvd.nist.gov (CVE-2026-1972)

Download JSON