Home

Description

Edimax GS-5008PL firmware version 1.00.54 and prior contain an insecure credential storage vulnerability that allows attackers to obtain administrator credentials by accessing configuration backup files. Attackers can download the config.bin file through fupload.cgi to extract plaintext username and password fields for unauthorized administrative access.

PUBLISHED Reserved 2026-03-16 | Published 2026-03-17 | Updated 2026-03-18 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-312 Cleartext storage of sensitive information

Product status

Default status
unknown

Any version
affected

Credits

Kazuma Matsumoto, a security researcher at GMO Cybersecurity by IERAE, Inc. finder

References

www.edimax.com/...a/edimax/us/smb_legacy_switches/gs-5008pl/ product

www.edimax.com/...e_list/data/edimax/us/smb_legacy_products/ product

www.vulncheck.com/...l-admin-credentials-stored-in-cleartext third-party-advisory

cve.org (CVE-2026-32842)

nvd.nist.gov (CVE-2026-32842)

Download JSON