EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious commands into the pppUserName field, allowing arbitrary code execution.
History

Mon, 12 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 12 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Edimax
Edimax br-6208ac V2
Vendors & Products Edimax
Edimax br-6208ac V2

Fri, 09 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
Description EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious commands into the pppUserName field, allowing arbitrary code execution.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-01-09T00:00:00.000Z

Updated: 2026-01-12T16:24:37.524Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-70161

cve-icon Vulnrichment

Updated: 2026-01-12T15:36:06.803Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-09T17:15:54.247

Modified: 2026-01-13T14:03:46.203

Link: CVE-2025-70161

cve-icon Redhat

No data.