edimax CVE Vulnerabilities & Metrics

Focus on edimax vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About edimax Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with edimax. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total edimax CVEs: 16
Earliest CVE date: 31 Dec 2004, 05:00 UTC
Latest CVE date: 12 Aug 2024, 13:38 UTC

Latest CVE reference: CVE-2024-7616

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -80.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -80.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical edimax CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.82

Max CVSS: 10.0

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 6
4.0-6.9 9
7.0-8.9 3
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS edimax CVEs

These are the five CVEs with the highest CVSS scores for edimax, sorted by severity first and recency.

All CVEs for edimax

CVE-2024-7616 edimax vulnerability CVSS: 5.2 12 Aug 2024, 13:38 UTC

A vulnerability was found in Edimax IC-6220DC and IC-5150W up to 3.06. It has been rated as critical. Affected by this issue is the function cgiFormString of the file ipcam_cgi. The manipulation of the argument host leads to command injection. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2023-49351 edimax vulnerability CVSS: 0 16 Jan 2024, 19:15 UTC

A stack-based buffer overflow vulnerability in /bin/webs binary in Edimax BR6478AC V2 firmware veraion v1.23 allows attackers to overwrite other values located on the stack due to an incorrect use of the strcpy() function.

CVE-2023-33722 edimax vulnerability CVSS: 0 31 May 2023, 19:15 UTC

EDIMAX BR-6288ACL v1.12 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the pppUserName parameter.

CVE-2023-31986 edimax vulnerability CVSS: 0 15 May 2023, 12:15 UTC

A Command Injection vulnerability in Edimax Wireless Router N300 Firmware BR-6428NS_v4 allows attacker to execute arbitrary code via the setWAN function in /bin/webs without any limitations.

CVE-2023-31983 edimax vulnerability CVSS: 0 12 May 2023, 16:15 UTC

A Command Injection vulnerability in Edimax Wireless Router N300 Firmware BR-6428NS_v4 allows attacker to execute arbitrary code via the mp function in /bin/webs without any limitations.

CVE-2023-31985 edimax vulnerability CVSS: 0 12 May 2023, 12:15 UTC

A Command Injection vulnerability in Edimax Wireless Router N300 Firmware BR-6428NS_v4 allows attacker to execute arbitrary code via the formAccept function in /bin/webs without any limitations.

CVE-2022-45768 edimax vulnerability CVSS: 0 07 Feb 2023, 21:15 UTC

Command Injection vulnerability in Edimax Technology Co., Ltd. Wireless Router N300 Firmware BR428nS v3 allows attacker to execute arbitrary code via the formWlanMP function.

CVE-2021-40597 edimax vulnerability CVSS: 10.0 29 Jun 2022, 20:15 UTC

The firmware of EDIMAX IC-3140W Version 3.11 is hardcoded with Administrator username and password.

CVE-2021-30165 edimax vulnerability CVSS: 5.0 27 Apr 2021, 03:15 UTC

The default administrator account & password of the EDIMAX wireless network camera is hard-coded. Remote attackers can disassemble firmware to obtain the privileged permission and further control the devices.

CVE-2020-26762 edimax vulnerability CVSS: 7.5 01 Dec 2020, 15:15 UTC

A stack-based buffer-overflow exists in Edimax IP-Camera IC-3116W (v3.06) and IC-3140W (v3.07), which allows an unauthenticated, unauthorized attacker to perform remote-code-execution due to a crafted GET-Request. The overflow occurs in binary ipcam_cgi due to a missing type check in function doGetSysteminfo(). This has been fixed in version: IC-3116W v3.08.

CVE-2019-13270 edimax vulnerability CVSS: 5.8 27 Aug 2019, 18:15 UTC

Edimax BR-6208AC V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. In order to transfer data from the host network to the guest network, the sender joins and then leaves an IGMP group. After it leaves, the router (following the IGMP protocol) creates an IGMP Membership Query packet with the Group IP and sends it to both the Host and the Guest networks. The data is transferred within the Group IP field, which is completely controlled by the sender.

CVE-2019-13269 edimax vulnerability CVSS: 5.8 27 Aug 2019, 18:15 UTC

Edimax BR-6208AC V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. A DHCP Request is sent to the router with a certain Transaction ID field. Following the DHCP protocol, the router responds with an ACK or NAK message. Studying the NAK case revealed that the router erroneously sends the NAK to both Host and Guest networks with the same Transaction ID as found in the DHCP Request. This allows encoding of data to be sent cross-router into the 32-bit Transaction ID field.

CVE-2019-13271 edimax vulnerability CVSS: 5.8 27 Aug 2019, 17:15 UTC

Edimax BR-6208AC V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet mask, but these routers did not restrict this traffic in any way. Depending on this factor, one must use either the lower 8 bits of the IP address, or the entire 32 bits, as the data payload.)

CVE-2016-10863 edimax vulnerability CVSS: 6.8 08 Aug 2019, 21:15 UTC

Edimax Wi-Fi Extender devices allow goform/formwlencryptvxd CSRF with resultant PSK key disclosure.

CVE-2018-10569 edimax vulnerability CVSS: 4.3 13 Aug 2018, 17:29 UTC

An issue was discovered in Edimax EW-7438RPn Mini v2 before version 1.26. There is XSS in an SSID field.

CVE-2018-8072 edimax vulnerability CVSS: 5.8 26 Apr 2018, 15:29 UTC

An issue was discovered on EDIMAX IC-3140W through 3.06, IC-5150W through 3.09, and IC-6220DC through 3.06 devices. The ipcam_cgi binary contains a stack-based buffer overflow that is possible to trigger from a remote unauthenticated /camera-cgi/public/getsysyeminfo.cgi?action=VALUE_HERE HTTP request: if the VALUE_HERE length is more than 0x400 (1024), it is possible to overwrite other values located on the stack due to an incorrect use of the strcpy() function.

CVE-2011-4502 edimax vulnerability CVSS: 10.0 22 Nov 2011, 11:55 UTC

The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153 with firmware before 1.39, and Sweex LB000021 with firmware 3.15 allows remote attackers to execute arbitrary commands via shell metacharacters.

CVE-2011-4501 edimax vulnerability CVSS: 10.0 22 Nov 2011, 11:55 UTC

The UPnP IGD implementation in Edimax EdiLinux on the Edimax BR-6104K with firmware before 3.25, Edimax 6114Wg, Canyon-Tech CN-WF512 with firmware 1.83, Canyon-Tech CN-WF514 with firmware 2.08, Sitecom WL-153 with firmware before 1.39, and Sweex LB000021 with firmware 3.15 allows remote attackers to establish arbitrary port mappings by sending a UPnP AddPortMapping action in a SOAP request to the WAN interface, related to an "external forwarding" vulnerability.

CVE-2006-2561 edimax vulnerability CVSS: 7.5 24 May 2006, 01:02 UTC

Edimax BR-6104K router allows remote attackers to bypass access restrictions and conduct unauthorized operations via a UPnP request with a modified InternalClient parameter (possibly within NewInternalClient), which is not validated, as demonstrated by using AddPortMapping to forward arbitrary traffic.

CVE-2004-1791 edimax vulnerability CVSS: 7.5 31 Dec 2004, 05:00 UTC

The web management interface in Edimax AR-6004 ADSL Routers uses a default administrator name and password, which also appear as the default login text for the management interface, which allows remote attackers to gain access.

CVE-2004-1790 edimax vulnerability CVSS: 4.3 31 Dec 2004, 05:00 UTC

Cross-site scripting (XSS) vulnerability in the web management interface in Edimax AR-6004 ADSL Routers allows remote attackers to inject arbitrary web script or HTML via the URL.