Edimax EW-7438RPn 1.13 contains a cross-site request forgery vulnerability in the MAC filtering configuration interface. Attackers can craft malicious web pages to trick users into adding unauthorized MAC addresses to the device's filtering rules without their consent.
References
| Link | Resource |
|---|---|
| https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/ | Product |
| https://www.exploit-db.com/exploits/48366 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/edimax-ew-rpn-cross-site-request-forgery-mac-filtering | Broken Link |
Configurations
Configuration 1 (hide)
| AND |
|
History
20 Feb 2026, 15:37
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/ - Product | |
| References | () https://www.exploit-db.com/exploits/48366 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/edimax-ew-rpn-cross-site-request-forgery-mac-filtering - Broken Link | |
| First Time |
Edimax ew-7438rpn Mini
Edimax Edimax ew-7438rpn Mini Firmware |
|
| Summary |
|
|
| CPE | cpe:2.3:o:edimax:ew-7438rpn_mini_firmware:1.13:*:*:*:*:*:*:* cpe:2.3:h:edimax:ew-7438rpn_mini:-:*:*:*:*:*:*:* |
03 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-03 22:16
Updated : 2026-02-20 15:37
NVD link : CVE-2020-37096
Mitre link : CVE-2020-37096
CVE.ORG link : CVE-2020-37096
JSON object : View
Products Affected
edimax
- ew-7438rpn_mini_firmware
- ew-7438rpn_mini
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
