Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18775 | An OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmware version 1.13 and prior via the syscmd.asp form handler. The /goform/formSysCmd endpoint exposes a system command interface through the sysCmd parameter. A remote authenticated attacker can submit arbitrary shell commands directly, resulting in command execution as the root user. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 21 Nov 2025 06:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmware version 1.13 and prior via the syscmd.asp form handler. The /goform/formSysCmd endpoint exposes a system command interface through the sysCmd parameter. A remote authenticated attacker can submit arbitrary shell commands directly, resulting in command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2025-10-07 UTC. | An OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmware version 1.13 and prior via the syscmd.asp form handler. The /goform/formSysCmd endpoint exposes a system command interface through the sysCmd parameter. A remote authenticated attacker can submit arbitrary shell commands directly, resulting in command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC. |
Fri, 21 Nov 2025 01:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmware version 1.13 and prior via the syscmd.asp form handler. The /goform/formSysCmd endpoint exposes a system command interface through the sysCmd parameter. A remote authenticated attacker can submit arbitrary shell commands directly, resulting in command execution as the root user. | An OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmware version 1.13 and prior via the syscmd.asp form handler. The /goform/formSysCmd endpoint exposes a system command interface through the sysCmd parameter. A remote authenticated attacker can submit arbitrary shell commands directly, resulting in command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2025-10-07 UTC. |
| Title | Edimax EW-7438RPn Mini OS Command Injection | Edimax EW-7438RPn Mini OS Command Injection via syscmd.asp |
Wed, 19 Nov 2025 21:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Edimax ew-7438rpn Mini V2
|
|
| CPEs | cpe:2.3:h:edimax:ew-7438rpn_mini_v2:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Edimax ew-7438rpn Mini V2
|
Wed, 24 Sep 2025 00:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Edimax ew-7438rpn Mini Firmware
|
|
| CPEs | cpe:2.3:h:edimax:ew-7438rpn_mini:-:*:*:*:*:*:*:* cpe:2.3:o:edimax:ew-7438rpn_mini_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Edimax ew-7438rpn Mini Firmware
|
|
| Metrics |
cvssV3_1
|
Tue, 24 Jun 2025 06:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 21 Jun 2025 04:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmware version 1.13 and prior via the syscmd.asp form handler. The /goform/formSysCmd endpoint exposes a system command interface through the sysCmd parameter. A remote authenticated attacker can submit arbitrary shell commands directly, resulting in command execution as the root user. | |
| Title | Edimax EW-7438RPn Mini OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-20T21:25:52.458Z
Reserved: 2025-04-15T19:15:22.546Z
Link: CVE-2025-34029
Updated: 2025-06-23T20:41:23.047Z
Status : Modified
Published: 2025-06-20T19:15:37.210
Modified: 2025-11-20T22:15:55.260
Link: CVE-2025-34029
No data.
OpenCVE Enrichment
Updated: 2025-06-23T17:20:14Z
EUVD