CVE-2020-37096

5.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in Edimax EW-7438RPn's MAC filtering interface allows attackers to trick authenticated users into adding unauthorized MAC addresses to the device's filtering rules. This affects users who access the web interface of vulnerable Edimax range extenders.

💻 Affected Systems

Products:
  • Edimax EW-7438RPn Mini
Versions: Version 1.13
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to be authenticated to the web interface for successful exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could add malicious MAC addresses to bypass network access controls, potentially allowing unauthorized devices to connect to the network.

🟠

Likely Case

Attackers trick users into adding specific MAC addresses to bypass MAC filtering, enabling unauthorized network access.

🟢

If Mitigated

With proper CSRF protections and network segmentation, impact is limited to potential MAC filtering bypass on isolated devices.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires user interaction (visiting malicious page while authenticated). Proof of concept available on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not provided by vendor

Restart Required: No

Instructions:

No official patch available. Check vendor website for firmware updates.

🔧 Temporary Workarounds

Disable MAC Filtering Interface

all

Disable or restrict access to the MAC filtering configuration interface if not needed.

Network Segmentation

all

Isolate the range extender on a separate VLAN to limit potential impact.

🧯 If You Can't Patch

  • Implement network-level MAC filtering on upstream devices
  • Use browser extensions that block CSRF attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface. If version is 1.13, device is vulnerable.

Check Version:

Login to web interface and check firmware version in system settings.

Verify Fix Applied:

No official fix available to verify.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected MAC address additions in device logs
  • Multiple MAC filtering configuration changes

Network Indicators:

  • Unauthorized devices connecting via MAC addresses not in original whitelist

SIEM Query:

Search for MAC address changes in device configuration logs

🔗 References

📤 Share & Export