No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 24 May 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in Edimax BR-6675nD 1.12. This affects the function formHwSet of the file /goform/formHwSet of the component POST Request Handler. The manipulation of the argument regDomain/ABandregDomain/nic0Addr/nic1Addr/wlanAddr/inicAddr results in command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Edimax BR-6675nD POST Request formHwSet command injection | |
| First Time appeared |
Edimax
Edimax br-6675nd |
|
| Weaknesses | CWE-74 CWE-77 |
|
| CPEs | cpe:2.3:a:edimax:br-6675nd:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Edimax
Edimax br-6675nd |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-24T11:15:09.504Z
Reserved: 2026-05-23T14:58:59.916Z
Link: CVE-2026-9378
No data.
No data.
No data.
OpenCVE Enrichment
Updated: 2026-05-24T13:30:15Z