A vulnerability was identified in Edimax BR-6428NS 1.10. The impacted element is the function formWanTcpipSetup of the file /goform/formWanTcpipSetup of the component POST Request Handler. Such manipulation of the argument pppUserName leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Sat, 23 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Edimax br-6428ns
|
|
| Vendors & Products |
Edimax br-6428ns
|
Sat, 23 May 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in Edimax BR-6428NS 1.10. The impacted element is the function formWanTcpipSetup of the file /goform/formWanTcpipSetup of the component POST Request Handler. Such manipulation of the argument pppUserName leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Edimax BR-6428NS POST Request formWanTcpipSetup buffer overflow | |
| First Time appeared |
Edimax
Edimax br-6428ns Firmware |
|
| Weaknesses | CWE-119 CWE-120 |
|
| CPEs | cpe:2.3:o:edimax:br-6428ns_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Edimax
Edimax br-6428ns Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-23T07:30:10.071Z
Reserved: 2026-05-22T17:38:37.055Z
Link: CVE-2026-9294
No data.
No data.
No data.
OpenCVE Enrichment
Updated: 2026-05-23T09:30:14Z