Metrics
Affected Vendors & Products
Fri, 19 Dec 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Edimax
Edimax br-6208ac V1 |
|
| Vendors & Products |
Edimax
Edimax br-6208ac V1 |
Fri, 19 Dec 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in Edimax BR-6208AC 1.02. This impacts the function handle_retr of the component FTP Daemon Service. The manipulation results in path traversal. The attack may be launched remotely. The exploit is now public and may be used. Edimax confirms this issue: "This product is no longer available in the market and has been discontinued for five years. Consequently, Edimax no longer provides technical support, firmware updates, or security patches for this specific model. However, to ensure the safety of our remaining active users, we acknowledge this report and will take the following mitigation actions: (A) We will issue an official security advisory on our support website. (B) We will strongly advise users to disable the FTP service on this device to mitigate the reported risk, by which the product will still work for common use. (C) We will recommend users upgrade to newer, supported models." This vulnerability only affects products that are no longer supported by the maintainer. | |
| Title | Edimax BR-6208AC FTP Daemon Service handle_retr path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-19T01:32:06.853Z
Reserved: 2025-12-18T18:34:25.519Z
Link: CVE-2025-14910
No data.
Status : Received
Published: 2025-12-19T02:16:04.903
Modified: 2025-12-19T02:16:04.903
Link: CVE-2025-14910
No data.
OpenCVE Enrichment
Updated: 2025-12-19T09:15:26Z