Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14092: OS Command Injection in Edimax BR-6478AC V3

0
Medium
VulnerabilityCVE-2025-14092cvecve-2025-14092
Published: Fri Dec 05 2025 (12/05/2025, 16:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Edimax
Product: BR-6478AC V3

Description

CVE-2025-14092 is a medium-severity OS command injection vulnerability found in Edimax BR-6478AC V3 routers running firmware version 1. 0. 15. The flaw exists in the sub_416898 function within /boafrm/formDebugDiagnosticRun, where manipulation of the 'host' argument allows remote attackers to execute arbitrary OS commands. No user interaction or authentication is required, and the attack can be launched remotely over the network. Although the vendor was notified, no patch or response has been provided, and no known exploits are currently observed in the wild. The CVSS 4. 0 score is 5. 1, reflecting moderate impact with low complexity and no privileges needed. European organizations using this router model could face risks of unauthorized command execution leading to potential network compromise or disruption.

AI-Powered Analysis

AILast updated: 12/12/2025, 16:33:01 UTC

Technical Analysis

CVE-2025-14092 is an OS command injection vulnerability identified in the Edimax BR-6478AC V3 router firmware version 1.0.15. The vulnerability resides in the function sub_416898, specifically within the /boafrm/formDebugDiagnosticRun endpoint, which processes a 'host' parameter. Improper sanitization or validation of this parameter allows an attacker to inject arbitrary operating system commands. Because the endpoint is accessible remotely and does not require authentication or user interaction, an attacker can exploit this flaw over the network without credentials. Successful exploitation could allow execution of arbitrary commands with the privileges of the affected process, potentially leading to full device compromise, unauthorized network access, or disruption of services. The vendor was notified early but has not issued a patch or response, leaving the vulnerability unmitigated. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability, resulting in a medium severity rating (5.1). No known exploits have been observed in the wild yet, but public disclosure increases the risk of exploitation attempts. This vulnerability affects a widely deployed consumer and small business router model, which is often used in home and office networks, increasing the potential attack surface.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized remote command execution on affected Edimax BR-6478AC V3 routers. This can lead to compromise of the router, enabling attackers to intercept, manipulate, or disrupt network traffic, pivot to internal networks, or launch further attacks. Confidentiality may be impacted if attackers access sensitive network data. Integrity and availability could also be affected if attackers modify configurations or cause denial of service. Small and medium enterprises relying on this router model for network connectivity are particularly at risk. The lack of vendor response and patch increases exposure duration. Additionally, the vulnerability could be leveraged in targeted attacks against organizations in sectors with high reliance on secure network infrastructure, such as finance, healthcare, or critical infrastructure. The potential for lateral movement within networks makes this a significant concern for European organizations aiming to maintain robust cybersecurity postures.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement specific mitigations: 1) Disable remote management interfaces on the Edimax BR-6478AC V3 routers to prevent external access to vulnerable endpoints. 2) Restrict network access to the router’s management interface using firewall rules or network segmentation, allowing only trusted internal IP addresses. 3) Monitor router logs and network traffic for unusual commands or connections indicative of exploitation attempts. 4) Where feasible, replace affected devices with models from vendors with active security support and patch management. 5) Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns or anomalous traffic targeting the /boafrm/formDebugDiagnosticRun endpoint. 6) Educate IT staff about this vulnerability and ensure rapid incident response capabilities. 7) Regularly audit network devices for firmware versions and known vulnerabilities to maintain situational awareness. These targeted actions go beyond generic advice and address the specific characteristics of this vulnerability and affected product.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-05T09:03:45.931Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69330517f88dbe026cf63b56

Added to database: 12/5/2025, 4:15:19 PM

Last enriched: 12/12/2025, 4:33:01 PM

Last updated: 1/20/2026, 6:25:33 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats