Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14910: Path Traversal in Edimax BR-6208AC

0
Medium
VulnerabilityCVE-2025-14910cvecve-2025-14910
Published: Fri Dec 19 2025 (12/19/2025, 01:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Edimax
Product: BR-6208AC

Description

A vulnerability was detected in Edimax BR-6208AC 1.02. This impacts the function handle_retr of the component FTP Daemon Service. The manipulation results in path traversal. The attack may be launched remotely. The exploit is now public and may be used. Edimax confirms this issue: "This product is no longer available in the market and has been discontinued for five years. Consequently, Edimax no longer provides technical support, firmware updates, or security patches for this specific model. However, to ensure the safety of our remaining active users, we acknowledge this report and will take the following mitigation actions: (A) We will issue an official security advisory on our support website. (B) We will strongly advise users to disable the FTP service on this device to mitigate the reported risk, by which the product will still work for common use. (C) We will recommend users upgrade to newer, supported models." This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:05:20 UTC

Technical Analysis

CVE-2025-14910 is a medium-severity path traversal vulnerability affecting the Edimax BR-6208AC router running firmware version 1.02. The vulnerability resides in the FTP Daemon Service's handle_retr function, which improperly sanitizes file path inputs. This allows a remote attacker to craft malicious FTP commands that traverse directories and access files outside the intended FTP root directory. The flaw can be exploited remotely without authentication or user interaction, requiring only low attack complexity. The vulnerability impacts confidentiality by potentially exposing sensitive files stored on the device or accessible through its filesystem. Edimax has confirmed the issue but no longer supports this product, which has been discontinued for over five years. No official patches or firmware updates are available. The vendor advises users to disable the FTP service to mitigate risk and upgrade to supported devices. Although no active exploitation has been reported, public exploit code exists, increasing the risk of opportunistic attacks. The CVSS 4.0 vector indicates no privileges or user interaction are needed, with partial confidentiality impact and no integrity or availability impact. This vulnerability highlights the risks of using unsupported legacy network devices with exposed services.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive information due to path traversal, which can expose configuration files, credentials, or other sensitive data stored on or accessible through the device. Organizations using the Edimax BR-6208AC in their networks may face confidentiality breaches, potentially leading to further compromise if attackers obtain credentials or configuration details. Although the vulnerability does not directly affect device integrity or availability, the exposure of sensitive files can facilitate subsequent attacks. Since the device is discontinued and unsupported, organizations cannot rely on vendor patches, increasing the risk of exploitation over time. The ease of remote exploitation without authentication means attackers can scan for vulnerable devices and attempt exploitation opportunistically. This risk is particularly relevant for environments where these routers remain in use, such as small offices or home networks that have not upgraded hardware. The lack of active exploit reports suggests limited current impact, but public exploit availability raises the likelihood of future attacks. Overall, the vulnerability poses a moderate risk to confidentiality and network security posture for affected users.

Mitigation Recommendations

Given the absence of official patches or firmware updates, mitigation must focus on reducing the attack surface and exposure. The primary recommendation is to immediately disable the FTP service on the Edimax BR-6208AC device, as advised by the vendor, since this service is the attack vector for the vulnerability. Disabling FTP will prevent remote exploitation of the path traversal flaw while allowing the device to continue functioning for other purposes. Network administrators should also isolate the device from untrusted networks, such as the internet, by placing it behind firewalls or restricting access to trusted internal networks only. Monitoring network traffic for unusual FTP requests or scanning activity targeting the device can help detect attempted exploitation. Ultimately, organizations should plan to replace the BR-6208AC with a modern, supported router model that receives regular security updates. For environments where replacement is not immediately feasible, implementing compensating controls such as network segmentation and strict access controls is critical. Regularly auditing network devices for unsupported hardware can prevent prolonged exposure to similar legacy vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-18T18:34:25.519Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6944b7d24eb3efac36c40a3b

Added to database: 12/19/2025, 2:26:26 AM

Last enriched: 2/24/2026, 11:05:20 PM

Last updated: 3/23/2026, 11:51:23 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses