Edimax EW-7438RPn-v3 Mini 1.27 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands through the /goform/mp endpoint. Attackers can exploit the vulnerability by sending crafted POST requests with command injection payloads to download and execute malicious scripts on the device.
References
| Link | Resource |
|---|---|
| https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/ | Product |
| https://www.exploit-db.com/exploits/48318 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/edimax-technology-ew-rpn-mini-remote-code-execution | Broken Link |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-05 17:16
Updated : 2026-02-18 18:09
NVD link : CVE-2020-37125
Mitre link : CVE-2020-37125
CVE.ORG link : CVE-2020-37125
JSON object : View
Products Affected
edimax
- ew-7438rpn_mini_firmware
- ew-7438rpn_mini
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
