CVE-2025-56706

8.0 HIGH

📋 TL;DR

The Edimax BR-6473AX router firmware version 1.0.28 contains a remote code execution vulnerability in the openwrt_getConfig function. Attackers can exploit this by sending specially crafted Object parameters to execute arbitrary code on affected devices. This affects all users running the vulnerable firmware version.

💻 Affected Systems

Products:
  • Edimax BR-6473AX
Versions: v1.0.28
Operating Systems: OpenWrt-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attackers to install persistent malware, intercept all network traffic, pivot to internal networks, and use the device as part of botnets.

🟠

Likely Case

Device takeover leading to network surveillance, credential theft, and use in DDoS attacks or cryptocurrency mining operations.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices directly accessible from WAN interfaces.
🏢 Internal Only: MEDIUM - Internal exploitation possible if attackers gain initial foothold in the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub demonstrates exploitation. The vulnerability requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check Edimax website for firmware updates. 2. Download latest firmware. 3. Access router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Network Access Control

linux

Restrict access to router management interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

Disable Remote Management

all

Turn off remote administration features if not required

🧯 If You Can't Patch

  • Isolate affected routers in separate VLAN with strict firewall rules
  • Implement network monitoring for suspicious traffic to/from router management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface or via SSH: cat /etc/openwrt_release

Check Version:

cat /etc/openwrt_release | grep VERSION

Verify Fix Applied:

Verify firmware version is updated beyond v1.0.28

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to router management interface
  • Suspicious process execution in system logs
  • Failed authentication attempts to admin interface

Network Indicators:

  • Unexpected outbound connections from router
  • Traffic to known malicious IPs from router
  • Port scanning originating from router

SIEM Query:

source="router.log" AND ("openwrt_getConfig" OR "POST /cgi-bin/luci") AND status=200

🔗 References

📤 Share & Export