CVE-2025-15256

7.3 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in Edimax BR-6208AC routers that allows remote attackers to execute arbitrary commands on affected devices by manipulating the rootAPmac parameter in the web configuration interface. The vulnerability affects users of Edimax BR-6208AC routers running firmware versions 1.02 and 1.03. The manufacturer has declared these devices end-of-life and will not provide patches.

💻 Affected Systems

Products:
  • Edimax BR-6208AC
Versions: 1.02, 1.03
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with web configuration interface accessible. V2 model specifically mentioned as EOL.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full control of the router, can pivot to internal network, install persistent backdoors, intercept/modify traffic, or use device as botnet node.

🟠

Likely Case

Remote attacker executes commands with router privileges, potentially changing configuration, stealing credentials, or disrupting network connectivity.

🟢

If Mitigated

If device is behind firewall with no external web interface access, risk is limited to internal attackers only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available in references. Remote exploitation possible via web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch available. Vendor recommends upgrading to newer models as device is end-of-life.

🔧 Temporary Workarounds

Disable Web Interface Access

all

Block external access to router web configuration interface

Configure firewall to block port 80/443 to router LAN IP from external networks

Network Segmentation

all

Isolate affected routers from critical network segments

Place routers in separate VLAN with restricted access

🧯 If You Can't Patch

  • Replace affected routers with supported models immediately
  • Implement strict network access controls to limit exposure of router web interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface at System Status > Firmware Version

Check Version:

N/A - check via web interface

Verify Fix Applied:

Cannot verify fix as no patch exists. Only verification is device replacement.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/formStaDrvSetup with shell metacharacters in parameters
  • Unexpected command execution in router logs

Network Indicators:

  • HTTP requests to router web interface containing shell commands in rootAPmac parameter
  • Outbound connections from router to unexpected destinations

SIEM Query:

http.url:"/goform/formStaDrvSetup" AND http.param:"rootAPmac" AND (http.param:";" OR http.param:"|" OR http.param:"&" OR http.param:"`")

🔗 References

📤 Share & Export