Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Edimax br-6208ac
Edimax br-6208ac Firmware |
|
| CPEs | cpe:2.3:h:edimax:br-6208ac:2.0:*:*:*:*:*:*:* cpe:2.3:o:edimax:br-6208ac_firmware:1.03:*:*:*:*:*:*:* |
|
| Vendors & Products |
Edimax br-6208ac
Edimax br-6208ac Firmware |
Mon, 12 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Edimax
Edimax br-6208ac V2 |
|
| Vendors & Products |
Edimax
Edimax br-6208ac V2 |
Fri, 09 Jan 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious commands into the pppUserName field, allowing arbitrary code execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-12T16:24:37.524Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-70161
Updated: 2026-01-12T15:36:06.803Z
Status : Analyzed
Published: 2026-01-09T17:15:54.247
Modified: 2026-01-22T20:45:13.620
Link: CVE-2025-70161
No data.
OpenCVE Enrichment
Updated: 2026-01-12T14:38:17Z