Edimax EW-7438RPn-v3 Mini 1.27 allows unauthenticated attackers to access the /wizard_reboot.asp page in unsetup mode, which discloses the Wi-Fi SSID and security key. Attackers can retrieve the wireless password by sending a GET request to this endpoint, exposing sensitive information without authentication.
References
| Link | Resource |
|---|---|
| https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/ | Product |
| https://www.exploit-db.com/exploits/48318 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/edimax-technology-ew-rpn-mini-unauthorized-access-wi-fi-password-disclosure | Broken Link |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-05 17:16
Updated : 2026-02-18 17:57
NVD link : CVE-2020-37150
Mitre link : CVE-2020-37150
CVE.ORG link : CVE-2020-37150
JSON object : View
Products Affected
edimax
- ew-7438rpn_mini_firmware
- ew-7438rpn_mini
CWE
CWE-201
Insertion of Sensitive Information Into Sent Data
