CVE-2025-15257

7.3 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in the Edimax BR-6208AC router's web configuration interface. Attackers can execute arbitrary commands remotely by manipulating route configuration parameters. Only users of the discontinued BR-6208AC V2 models are affected.

💻 Affected Systems

Products:
  • Edimax BR-6208AC V2
Versions: Firmware versions 1.02 and 1.03
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with web configuration interface enabled (default). Product is End of Life with no vendor support.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full router compromise allowing attacker to intercept all network traffic, install persistent backdoors, pivot to internal networks, and use router for DDoS attacks or cryptocurrency mining.

🟠

Likely Case

Router takeover leading to network monitoring, credential theft, DNS hijacking, and use as attack platform against internal devices.

🟢

If Mitigated

Limited impact if router is isolated in separate VLAN with strict firewall rules and no internal network access.

🌐 Internet-Facing: HIGH - Router web interface is typically internet-facing and exploit requires no authentication.
🏢 Internal Only: MEDIUM - Lower risk if router is behind firewall, but still vulnerable to internal attackers or compromised devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code available. Attack requires network access to router web interface but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: No official advisory - vendor states product is End of Life

Restart Required: No

Instructions:

No official patch available. Vendor recommends replacing device with newer model.

🔧 Temporary Workarounds

Disable Web Interface

all

Disable the vulnerable web configuration interface entirely

Access router CLI via SSH/Telnet and disable web interface (specific commands vary by configuration)

Network Segmentation

all

Isolate router in separate VLAN with no access to internal network

Configure firewall rules to restrict router management interface access

🧯 If You Can't Patch

  • Immediately replace affected routers with supported models
  • Implement strict firewall rules blocking all external access to router management interface (ports 80/443)

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface at http://router-ip/ or via CLI command 'show version'

Check Version:

ssh admin@router-ip 'show version' or check web interface System Status page

Verify Fix Applied:

Cannot verify fix as no patch exists. Verify replacement with new router model.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /gogorm/formRoute with shell metacharacters in parameters
  • Router logs showing unexpected command execution

Network Indicators:

  • Unusual outbound connections from router to external IPs
  • DNS queries from router to suspicious domains

SIEM Query:

source="router-logs" AND (uri="/gogorm/formRoute" AND (param="strIp" OR param="strMask" OR param="strGateway") AND value MATCHES "[;&|`$()]+")

🔗 References

📤 Share & Export