CVE-2025-15258

3.5 LOW

📋 TL;DR

This CVE describes an open redirect vulnerability in the Edimax BR-6208AC router's web configuration interface. Attackers can manipulate the wlan-url parameter to redirect users to malicious websites. Only users of the discontinued Edimax BR-6208AC V2 router are affected.

💻 Affected Systems

Products:
  • Edimax BR-6208AC V2
Versions: 1.02, 1.03
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with web interface accessible. Device is End of Life (EOL) with no vendor support.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to phishing sites that steal credentials or deliver malware, potentially leading to account compromise or system infection.

🟠

Likely Case

Attackers redirect users to phishing pages to harvest login credentials or display malicious ads.

🟢

If Mitigated

With proper network segmentation and user awareness, impact is limited to potential credential theft from redirected users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available. Attack requires user interaction (clicking a link).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: No official advisory beyond EOL statement

Restart Required: No

Instructions:

No official patch available. Vendor recommends replacing device with newer model.

🔧 Temporary Workarounds

Disable Web Interface Access

all

Block external access to router web interface

Configure firewall to block port 80/443 to router LAN IP
Disable remote administration in router settings

Network Segmentation

all

Isolate router management interface

Place router on separate VLAN
Restrict access to management interface to specific IPs

🧯 If You Can't Patch

  • Replace router with supported model immediately
  • Implement strict network segmentation and firewall rules to limit access to router interface

🔍 How to Verify

Check if Vulnerable:

Check router firmware version in web interface. If version is 1.02 or 1.03, device is vulnerable.

Check Version:

Login to router web interface and check firmware version in System Status or similar section.

Verify Fix Applied:

No fix available to verify. Only mitigation is device replacement.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirects in web server logs
  • Requests to /goform/formALGSetup with suspicious wlan-url parameters

Network Indicators:

  • HTTP redirects from router to external domains
  • Unusual outbound traffic following router access

SIEM Query:

web.url:*goform/formALGSetup* AND web.query:wlan-url=*http*

🔗 References

📤 Share & Export