CVE-2025-15256
📋 TL;DR
This CVE describes a command injection vulnerability in Edimax BR-6208AC routers that allows remote attackers to execute arbitrary commands on affected devices by manipulating the rootAPmac parameter in the web configuration interface. The vulnerability affects users of Edimax BR-6208AC routers running firmware versions 1.02 and 1.03. The manufacturer has declared these devices end-of-life and will not provide patches.
💻 Affected Systems
- Edimax BR-6208AC
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote unauthenticated attacker gains full control of the router, can pivot to internal network, install persistent backdoors, intercept/modify traffic, or use device as botnet node.
Likely Case
Remote attacker executes commands with router privileges, potentially changing configuration, stealing credentials, or disrupting network connectivity.
If Mitigated
If device is behind firewall with no external web interface access, risk is limited to internal attackers only.
🎯 Exploit Status
Public exploit details available in references. Remote exploitation possible via web interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: N/A
Restart Required: No
Instructions:
No official patch available. Vendor recommends upgrading to newer models as device is end-of-life.
🔧 Temporary Workarounds
Disable Web Interface Access
allBlock external access to router web configuration interface
Configure firewall to block port 80/443 to router LAN IP from external networks
Network Segmentation
allIsolate affected routers from critical network segments
Place routers in separate VLAN with restricted access
🧯 If You Can't Patch
- Replace affected routers with supported models immediately
- Implement strict network access controls to limit exposure of router web interface
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via web interface at System Status > Firmware Version
Check Version:
N/A - check via web interface
Verify Fix Applied:
Cannot verify fix as no patch exists. Only verification is device replacement.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /goform/formStaDrvSetup with shell metacharacters in parameters
- Unexpected command execution in router logs
Network Indicators:
- HTTP requests to router web interface containing shell commands in rootAPmac parameter
- Outbound connections from router to unexpected destinations
SIEM Query:
http.url:"/goform/formStaDrvSetup" AND http.param:"rootAPmac" AND (http.param:";" OR http.param:"|" OR http.param:"&" OR http.param:"`")
🔗 References
- https://tzh00203.notion.site/EDIMAX-BR-6208AC-V2_1-02-Command-Injection-Vulnerability-in-Web-formStaDrvSetup-handler-2d2b5c52018a803ebd91c200b3e2925b?source=copy_link
- https://vuldb.com/?ctiid.338646
- https://vuldb.com/?id.338646
- https://vuldb.com/?submit.722014
- https://tzh00203.notion.site/EDIMAX-BR-6208AC-V2_1-02-Command-Injection-Vulnerability-in-Web-formStaDrvSetup-handler-2d2b5c52018a803ebd91c200b3e2925b