VYPR
Unrated severityNVD Advisory· Published May 23, 2026

Edimax EW-7438RPn webs formWpsStart os command injection

CVE-2026-9343

Description

A weakness has been identified in Edimax EW-7438RPn up to 1.31. The affected element is the function formWpsStart of the file /goform/formWpsStart of the component webs. This manipulation of the argument pinCode causes os command injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A command injection vulnerability in Edimax EW-7438RPn up to 1.31 allows remote authenticated attackers to execute arbitrary OS commands via the pinCode parameter in formWpsStart.

Vulnerability

The vulnerability resides in the formWpsStart function within the webs component of the Edimax EW-7438RPn wireless extender firmware up to version 1.31. The function handles WPS configuration via the /goform/formWpsStart endpoint. The pinCode argument is directly passed to an OS command without proper sanitization or validation, enabling os command injection [1]. An attacker can inject arbitrary commands by embedding them in backticks within the pinCode parameter.

Exploitation

Exploitation requires network access to the device and valid authentication credentials (as demonstrated by the Authorization header in the PoC) [1]. The attacker sends a crafted POST request to /goform/formWpsStart with the pinCode parameter containing command injection payloads enclosed in backticks. For example, setting pinCode to `telnetd -l /bin/sh -p 1234` will cause the device to execute the injected command. The PoC shows a specific request with appropriate headers and cookie [1].

Impact

Successful exploitation allows an attacker to execute arbitrary OS commands on the device with the privileges of the webs process, typically root. This can lead to full remote compromise, allowing the attacker to gain a reverse shell (as demonstrated by launching telnetd), exfiltrate sensitive data, modify device configuration, or use the device as a pivot point within the network [1].

Mitigation

As of the publication date (2026-05-23), the vendor (Edimax) has not responded to the disclosure and no official patch has been released [1]. Users should consider isolating the device on a separate VLAN or network segment, restricting access to the management interface to trusted hosts only, and monitoring for any suspicious activity. If possible, disable WPS functionality or upgrade to a newer firmware version if one becomes available. The author suggests input validation on the pinCode parameter as a remediation [1].

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.