A vulnerability was found in Edimax BR-6208AC 2_1.02. The affected element is the function auth_check_userpass2. Performing a manipulation of the argument Username/Password results in use of default credentials. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.
References
| Link | Resource |
|---|---|
| https://tzh00203.notion.site/EDIMAX-BR-6208AC-V2_1-02-Weak-Password-Authentication-Vulnerability-in-auth_check_userpass2-Functi-2f0b5c52018a801c9645dd5261717901?source=copy_link | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.344494 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344494 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.744032 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-06 02:16
Updated : 2026-02-20 15:20
NVD link : CVE-2026-1972
Mitre link : CVE-2026-1972
CVE.ORG link : CVE-2026-1972
JSON object : View
Products Affected
edimax
- br-6208ac
- br-6208ac_firmware
CWE
CWE-1392
Use of Default Credentials
