VYPR
Unrated severityNVD Advisory· Published May 24, 2026

Edimax EW-7438RPn webs formWirelessTbl buffer overflow

CVE-2026-9346

Description

A flaw has been found in Edimax EW-7438RPn up to 1.31. This impacts the function formWirelessTbl of the file /goform/formWirelessTbl of the component webs. Executing a manipulation of the argument submit-url can lead to buffer overflow. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stack buffer overflow in Edimax EW-7438RPn firmware up to 1.31 allows remote attackers to crash the device or execute arbitrary code via a crafted submit-url parameter.

Vulnerability

A stack buffer overflow vulnerability exists in the Edimax EW-7438RPn wireless extender firmware version 1.31 and earlier. The flaw resides in the formWirelessTbl function within the webs binary, accessible via the /goform/formWirelessTbl endpoint. The submit-url parameter is copied directly into a stack-based buffer without any length validation, allowing an attacker to overflow the buffer and overwrite the return address [1].

Exploitation

An attacker with network access to the device's web interface and valid administrative credentials can exploit this vulnerability. By sending a crafted POST request to /goform/formWirelessTbl with an excessively long submit-url value (e.g., a string of 'a' characters), the stack is overflowed, causing a crash or potentially redirecting execution flow [1]. The provided proof-of-concept demonstrates a request with a 1648-byte payload that triggers the overflow.

Impact

Successful exploitation can result in denial of service (device crash) or arbitrary code execution at the privilege level of the webs process, which typically runs with root privileges on such embedded devices. This would allow an attacker to fully compromise the extender, potentially gaining persistent access and using it as a pivot point within the network [1].

Mitigation

As of the publication date, the vendor has not responded to the disclosure and no official patch has been released. Users of the Edimax EW-7438RPn with firmware version 1.31 or earlier are advised to restrict network access to the web administration interface, change default credentials, and consider replacing the device if a fix becomes unavailable. No workaround is provided by the vendor [1].

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.