EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious commands into the pppUserName field, allowing arbitrary code execution.
References
| Link | Resource |
|---|---|
| https://tzh00203.notion.site/EDIMAX-BR-6208AC-V2_1-02-Command-Injection-Vulnerability-in-Web-setWAN-handler-2d3b5c52018a80d7ae8dce2bf5e3294c?source=copy_link | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-09 17:15
Updated : 2026-01-22 20:45
NVD link : CVE-2025-70161
Mitre link : CVE-2025-70161
CVE.ORG link : CVE-2025-70161
JSON object : View
Products Affected
edimax
- br-6208ac_firmware
- br-6208ac
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
