Description
A weakness has been identified in Edimax BR-6428NS 1.10. This impacts the function system of the file /goform/formWlanM of the component POST Request Handler. Executing a manipulation of the argument ateFunc/ateGain/ateTxCount/ateChan/ateRate/ateMacID/e2pTxPower1/e2pTxPower2/e2pTxPower3/e2pTxPower4/e2pTxPower5/e2pTxPower6/e2pTxPower7/e2pTx2Power1/e2pTx2Power2/e2pTx2Power3/e2pTx2Power4/e2pTx2Power5/e2pTx2Power6/e2pTx2Power7/ateTxFreqOffset/ateMode/ateBW/ateAntenna/e2pTxFreqOffset/e2pTxPwDeltaB/e2pTxPwDeltaG/e2pTxPwDeltaMix/e2pTxPwDeltaN/readE2P can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
Timeline
| 2026-05-22: | Advisory disclosed |
| 2026-05-22: | VulDB entry created |
| 2026-05-22: | VulDB entry last update |
Credits
wxhwxhwxh_tutu (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/365243 (VDB-365243 | Edimax BR-6428NS POST Request formWlanM system command injection)
vuldb.com/vuln/365243/cti (VDB-365243 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/811535 (Submit #811535 | EDIMAX BR-6428NS BR-6428NS_v4_1.10 Command Injection)
lavender-bicycle-a5a.notion.site/...97db80b?source=copy_link