CVE-2025-34029

| EUVD-2025-18775 HIGH
2025-06-20 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 00:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 00:19 euvd
EUVD-2025-18775
PoC Detected
Nov 20, 2025 - 22:15 vuln.today
Public exploit code
CVE Published
Jun 20, 2025 - 19:15 nvd
HIGH 8.8

Description

An OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmware version 1.13 and prior via the syscmd.asp form handler. The /goform/formSysCmd endpoint exposes a system command interface through the sysCmd parameter. A remote authenticated attacker can submit arbitrary shell commands directly, resulting in command execution as the root user. Exploitation evidence was observed by the Shadowserver Foundation on 2024-09-14 UTC.

Analysis

CVE-2025-34029 is an OS command injection vulnerability in Edimax EW-7438RPn Mini wireless router firmware version 1.13 and prior that allows authenticated remote attackers to execute arbitrary shell commands as root through the /goform/formSysCmd endpoint. The vulnerability has a CVSS score of 8.8 (High) and was observed being exploited in the wild by the Shadowserver Foundation on 2024-09-14 UTC, indicating active real-world attack activity against this widely-deployed consumer networking device.

Technical Context

The vulnerability resides in the syscmd.asp form handler, which exposes a system command interface through the 'sysCmd' parameter without proper input validation or sanitization. This is a classic OS command injection (CWE-78) vulnerability where user-supplied input from the sysCmd parameter is directly passed to shell execution functions, likely via system(), exec(), or similar UNIX command execution APIs common in embedded web-based device management interfaces. The affected device is the Edimax EW-7438RPn Mini (a compact dual-band wireless repeater/access point commonly used in enterprise and home networks), and the vulnerability exists in firmware versions 1.13 and all prior releases. The /goform/formSysCmd endpoint suggests a form-based web interface typical of embedded Linux devices using common firmware frameworks.

Affected Products

Edimax EW-7438RPn Mini wireless repeater/access point, firmware version 1.13 and all prior versions. CPE specification: cpe:2.3:o:edimax:ew-7438rpn_mini_firmware:*:*:*:*:*:*:*:* (versions up to and including 1.13). The vulnerability affects both the device hardware model EW-7438RPn with 'Mini' designation and potentially similarly-architected Edimax firmware branches. No vendor advisory URL is provided in the description; organizations should contact Edimax directly or monitor their support portal for firmware updates beyond version 1.13.

Remediation

Immediate remediation steps: (1) Upgrade Edimax EW-7438RPn Mini firmware to a version newer than 1.13 (vendor must release patched firmware—no specific patched version number provided in the description; contact Edimax support or check http://www.edimax.com for firmware downloads), (2) If patched firmware is unavailable, implement network-level mitigations: restrict access to the device management interface (port 80/443) using firewall rules, disable remote management access if enabled, and ensure the device is only accessible from trusted administrative networks, (3) Change default credentials if the device uses them (default admin username/password should be changed to strong, unique credentials), (4) Monitor network traffic to the device for suspicious /goform/formSysCmd requests, (5) Consider isolating or decommissioning affected devices in high-security environments until patching is confirmed. Check Edimax security advisories at their support site for official patches and timelines.

Priority Score

66
Low Medium High Critical
KEV: 0
EPSS: +2.1
CVSS: +44
POC: +20

Share

CVE-2025-34029 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy