Home

Description

Edimax GS-5008PL firmware version 1.00.54 and prior contain a cross-site request forgery vulnerability that allows remote attackers to perform unauthorized administrative actions by inducing logged-in administrators to visit malicious pages. Attackers can exploit the lack of anti-CSRF tokens and request validation to change passwords, upload firmware, reboot the device, perform factory resets, or modify network configurations.

PUBLISHED Reserved 2026-03-16 | Published 2026-03-17 | Updated 2026-03-18 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Problem types

CWE-352 Cross-Site request forgery (CSRF)

Product status

Default status
unknown

Any version
affected

Credits

Kazuma Matsumoto, a security researcher at GMO Cybersecurity by IERAE, Inc. finder

References

www.edimax.com/...a/edimax/us/smb_legacy_switches/gs-5008pl/ product

www.edimax.com/...e_list/data/edimax/us/smb_legacy_products/ product

www.vulncheck.com/...008pl-csrf-via-management-cgi-endpoints third-party-advisory

cve.org (CVE-2026-32839)

nvd.nist.gov (CVE-2026-32839)

Download JSON