ID

VAR-202602-0096


CVE

CVE-2020-37125


DESCRIPTION

Edimax EW-7438RPn-v3 Mini 1.27 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands through the /goform/mp endpoint. Attackers can exploit the vulnerability by sending crafted POST requests with command injection payloads to download and execute malicious scripts on the device.

Trust: 1.0

sources: NVD: CVE-2020-37125

AFFECTED PRODUCTS

vendor:edimaxmodel:ew-7438rpn miniscope:eqversion:1.27

Trust: 1.0

sources: NVD: CVE-2020-37125

CVSS

SEVERITY

CVSSV2

CVSSV3

disclosure@vulncheck.com: CVE-2020-37125
value: CRITICAL

Trust: 1.0

disclosure@vulncheck.com: CVE-2020-37125
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: NVD: CVE-2020-37125

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

sources: NVD: CVE-2020-37125

EXTERNAL IDS

db:EXPLOIT-DBid:48318

Trust: 1.0

db:NVDid:CVE-2020-37125

Trust: 1.0

sources: NVD: CVE-2020-37125

REFERENCES

url:https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/

Trust: 1.0

url:https://www.vulncheck.com/advisories/edimax-technology-ew-rpn-mini-remote-code-execution

Trust: 1.0

url:https://www.exploit-db.com/exploits/48318

Trust: 1.0

sources: NVD: CVE-2020-37125

SOURCES

db:NVDid:CVE-2020-37125

LAST UPDATE DATE

2026-02-19T23:27:24.754000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2020-37125date:2026-02-18T18:09:41.337

SOURCES RELEASE DATE

db:NVDid:CVE-2020-37125date:2026-02-05T17:16:07.207