Edimax EW-7438RPn-v3 Mini 1.27 allows unauthenticated attackers to access the /wizard_reboot.asp page in unsetup mode, which discloses the Wi-Fi SSID and security key. Attackers can retrieve the wireless password by sending a GET request to this endpoint, exposing sensitive information without authentication.
References
| Link | Resource |
|---|---|
| https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/ | Product |
| https://www.exploit-db.com/exploits/48318 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/edimax-technology-ew-rpn-mini-unauthorized-access-wi-fi-password-disclosure | Broken Link |
Configurations
Configuration 1 (hide)
| AND |
|
History
18 Feb 2026, 17:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/ - Product | |
| References | () https://www.exploit-db.com/exploits/48318 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/edimax-technology-ew-rpn-mini-unauthorized-access-wi-fi-password-disclosure - Broken Link | |
| CPE | cpe:2.3:h:edimax:ew-7438rpn_mini:3:*:*:*:*:*:*:* cpe:2.3:o:edimax:ew-7438rpn_mini_firmware:1.27:*:*:*:*:*:*:* |
|
| Summary |
|
|
| First Time |
Edimax ew-7438rpn Mini
Edimax Edimax ew-7438rpn Mini Firmware |
05 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-05 17:16
Updated : 2026-02-18 17:57
NVD link : CVE-2020-37150
Mitre link : CVE-2020-37150
CVE.ORG link : CVE-2020-37150
JSON object : View
Products Affected
edimax
- ew-7438rpn_mini_firmware
- ew-7438rpn_mini
CWE
CWE-201
Insertion of Sensitive Information Into Sent Data
