Edimax EW-7438RPn webs formWizSurvey os command injection
Description
A vulnerability has been found in Edimax EW-7438RPn up to 1.31. Affected is the function formWizSurvey of the file /goform/formWizSurvey of the component webs. The manipulation of the argument ip/mask/gateway leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Edimax EW-7438RPn up to 1.31 has a command injection in formWizSurvey via ip/mask/gateway parameters, allowing remote attackers to execute arbitrary OS commands.
Vulnerability
The vulnerability resides in the formWizSurvey function of the webs component in Edimax EW-7438RPn firmware up to version 1.31. The function does not sanitize user-supplied input in the ip, mask, and gateway parameters, allowing an attacker to inject arbitrary OS commands through backticks or other shell metacharacters [1].
Exploitation
An attacker with network access to the device can send a crafted POST request to /goform/formWizSurvey. The exploit requires valid credentials (default credentials admin:1234 are often used) and can be executed remotely without any prior authentication requirement beyond the default login [1]. The PoC demonstrates setting the ip parameter to ` telnetd -l /bin/sh -p 1234 ` to start a telnet shell [1].
Impact
Successful exploitation allows the attacker to execute arbitrary operating system commands as root on the device. This can lead to full compromise, including data exfiltration, further network attacks, and persistent backdoor access [1].
Mitigation
The vendor was informed but did not respond, and no patch has been released as of the publication date [1]. Users are advised to restrict network access to the device, change default credentials, and consider replacing the device if it remains unpatched.
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=1.31
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/wudipjq/my_vuln/blob/main/Edimax/vuln_5/5.mdmitreexploit
- vuldb.com/submit/811543mitrethird-party-advisory
- vuldb.com/submit/813889mitrethird-party-advisory
- vuldb.com/vuln/365310mitrevdb-entrytechnical-description
- vuldb.com/vuln/365310/ctimitresignaturepermissions-required
News mentions
0No linked articles in our index yet.