CVE-2025-14910: Path Traversal in Edimax BR-6208AC
A vulnerability was detected in Edimax BR-6208AC 1.02. This impacts the function handle_retr of the component FTP Daemon Service. The manipulation results in path traversal. The attack may be launched remotely. The exploit is now public and may be used. Edimax confirms this issue: "This product is no longer available in the market and has been discontinued for five years. Consequently, Edimax no longer provides technical support, firmware updates, or security patches for this specific model. However, to ensure the safety of our remaining active users, we acknowledge this report and will take the following mitigation actions: (A) We will issue an official security advisory on our support website. (B) We will strongly advise users to disable the FTP service on this device to mitigate the reported risk, by which the product will still work for common use. (C) We will recommend users upgrade to newer, supported models." This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-14910 is a path traversal vulnerability discovered in the FTP Daemon Service component of the Edimax BR-6208AC router, specifically version 1.02. The vulnerability resides in the handle_retr function, which processes FTP RETR commands to retrieve files. By manipulating input parameters, an attacker can traverse directories outside the intended FTP root directory, gaining unauthorized access to arbitrary files on the device's filesystem. The attack vector is remote network access to the FTP service, requiring no user interaction and minimal privileges, making exploitation relatively straightforward. The vulnerability has a CVSS 4.0 base score of 5.3 (medium severity), reflecting its moderate impact on confidentiality with low complexity and no authentication needed. Edimax has confirmed the issue but no longer supports this model, which was discontinued five years ago. The vendor recommends disabling the FTP service or upgrading to supported hardware. No patches or firmware updates are available, and no active exploits have been reported in the wild. The public availability of exploit details increases the risk for organizations still operating this legacy device, especially if the FTP service remains enabled and exposed to untrusted networks.
Potential Impact
For European organizations, the primary impact of CVE-2025-14910 lies in potential unauthorized disclosure of sensitive information stored on the affected router's filesystem. Attackers exploiting this vulnerability can access configuration files, credentials, or other critical data, potentially facilitating further network compromise or lateral movement. Since the device is discontinued and unsupported, organizations cannot rely on vendor patches, increasing exposure risk. The vulnerability could also be leveraged as a foothold for persistent access or to disrupt network operations if critical files are accessed or modified. Given the FTP service is often exposed for remote management or file transfers, the attack surface is significant if not properly segmented. The impact is heightened in environments where legacy hardware remains in use due to budget constraints or operational inertia, common in some European public sector or small-to-medium enterprises. Additionally, compliance with data protection regulations like GDPR may be jeopardized if sensitive data is exposed through this vulnerability.
Mitigation Recommendations
Organizations should immediately identify any Edimax BR-6208AC devices running firmware version 1.02 and assess whether the FTP service is enabled and accessible from untrusted networks. The primary mitigation is to disable the FTP Daemon Service entirely, as recommended by Edimax, which will prevent exploitation while maintaining other router functions. If FTP functionality is essential, organizations should isolate the device within a secure network segment with strict access controls and monitor FTP traffic for anomalies. Network-level protections such as firewall rules restricting FTP access to trusted IPs can reduce exposure. Given the lack of vendor patches, organizations should plan to replace these legacy devices with supported models that receive regular security updates. Additionally, conducting regular network scans to detect legacy devices and auditing configurations for unnecessary services will reduce risk. Incident response plans should include monitoring for exploitation attempts leveraging this vulnerability, especially since public exploit code is available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-14910: Path Traversal in Edimax BR-6208AC
Description
A vulnerability was detected in Edimax BR-6208AC 1.02. This impacts the function handle_retr of the component FTP Daemon Service. The manipulation results in path traversal. The attack may be launched remotely. The exploit is now public and may be used. Edimax confirms this issue: "This product is no longer available in the market and has been discontinued for five years. Consequently, Edimax no longer provides technical support, firmware updates, or security patches for this specific model. However, to ensure the safety of our remaining active users, we acknowledge this report and will take the following mitigation actions: (A) We will issue an official security advisory on our support website. (B) We will strongly advise users to disable the FTP service on this device to mitigate the reported risk, by which the product will still work for common use. (C) We will recommend users upgrade to newer, supported models." This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Technical Analysis
CVE-2025-14910 is a path traversal vulnerability discovered in the FTP Daemon Service component of the Edimax BR-6208AC router, specifically version 1.02. The vulnerability resides in the handle_retr function, which processes FTP RETR commands to retrieve files. By manipulating input parameters, an attacker can traverse directories outside the intended FTP root directory, gaining unauthorized access to arbitrary files on the device's filesystem. The attack vector is remote network access to the FTP service, requiring no user interaction and minimal privileges, making exploitation relatively straightforward. The vulnerability has a CVSS 4.0 base score of 5.3 (medium severity), reflecting its moderate impact on confidentiality with low complexity and no authentication needed. Edimax has confirmed the issue but no longer supports this model, which was discontinued five years ago. The vendor recommends disabling the FTP service or upgrading to supported hardware. No patches or firmware updates are available, and no active exploits have been reported in the wild. The public availability of exploit details increases the risk for organizations still operating this legacy device, especially if the FTP service remains enabled and exposed to untrusted networks.
Potential Impact
For European organizations, the primary impact of CVE-2025-14910 lies in potential unauthorized disclosure of sensitive information stored on the affected router's filesystem. Attackers exploiting this vulnerability can access configuration files, credentials, or other critical data, potentially facilitating further network compromise or lateral movement. Since the device is discontinued and unsupported, organizations cannot rely on vendor patches, increasing exposure risk. The vulnerability could also be leveraged as a foothold for persistent access or to disrupt network operations if critical files are accessed or modified. Given the FTP service is often exposed for remote management or file transfers, the attack surface is significant if not properly segmented. The impact is heightened in environments where legacy hardware remains in use due to budget constraints or operational inertia, common in some European public sector or small-to-medium enterprises. Additionally, compliance with data protection regulations like GDPR may be jeopardized if sensitive data is exposed through this vulnerability.
Mitigation Recommendations
Organizations should immediately identify any Edimax BR-6208AC devices running firmware version 1.02 and assess whether the FTP service is enabled and accessible from untrusted networks. The primary mitigation is to disable the FTP Daemon Service entirely, as recommended by Edimax, which will prevent exploitation while maintaining other router functions. If FTP functionality is essential, organizations should isolate the device within a secure network segment with strict access controls and monitor FTP traffic for anomalies. Network-level protections such as firewall rules restricting FTP access to trusted IPs can reduce exposure. Given the lack of vendor patches, organizations should plan to replace these legacy devices with supported models that receive regular security updates. Additionally, conducting regular network scans to detect legacy devices and auditing configurations for unnecessary services will reduce risk. Incident response plans should include monitoring for exploitation attempts leveraging this vulnerability, especially since public exploit code is available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-18T18:34:25.519Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6944b7d24eb3efac36c40a3b
Added to database: 12/19/2025, 2:26:26 AM
Last enriched: 12/26/2025, 4:26:30 AM
Last updated: 2/7/2026, 6:39:31 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.