An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC.
References
| Link | Resource |
|---|---|
| https://vulncheck.com/advisories/edimax-ew-7438rpn-command-injections | Exploit Third Party Advisory |
| https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=32163 | Third Party Advisory |
| https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/ | Product |
| https://www.exploit-db.com/exploits/48377 | Exploit VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
20 Nov 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC. |
20 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| Summary | (en) An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware version 1.13 and prior via the mp.asp form handler. The /goform/mp endpoint improperly handles user-supplied input to the command parameter. An authenticated attacker can inject shell commands using shell metacharacters to achieve arbitrary command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2025-10-07 UTC. |
23 Sep 2025, 15:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://vulncheck.com/advisories/edimax-ew-7438rpn-command-injections - Exploit, Third Party Advisory | |
| References | () https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=32163 - Third Party Advisory | |
| References | () https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/ - Product | |
| References | () https://www.exploit-db.com/exploits/48377 - Exploit, VDB Entry | |
| CPE | cpe:2.3:h:edimax:ew-7438rpn_mini:-:*:*:*:*:*:*:* cpe:2.3:o:edimax:ew-7438rpn_mini_firmware:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| First Time |
Edimax
Edimax ew-7438rpn Mini Edimax ew-7438rpn Mini Firmware |
23 Jun 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
20 Jun 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-20 19:15
Updated : 2025-11-20 22:15
NVD link : CVE-2025-34024
Mitre link : CVE-2025-34024
CVE.ORG link : CVE-2025-34024
JSON object : View
Products Affected
edimax
- ew-7438rpn_mini_firmware
- ew-7438rpn_mini
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
