CVE-2025-34024
Severity CVSS v4.0:
CRITICAL
Type:
CWE-78
OS Command Injections
Publication date:
20/06/2025
Last modified:
20/11/2025
Description
An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC.
Impact
Base Score 4.0
9.40
Severity 4.0
CRITICAL
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:edimax:ew-7438rpn_mini_firmware:*:*:*:*:*:*:*:* | 1.13 (including) | |
| cpe:2.3:h:edimax:ew-7438rpn_mini:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://vulncheck.com/advisories/edimax-ew-7438rpn-command-injections
- https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=32163
- https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/
- https://www.exploit-db.com/exploits/48377



