Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15258: Open Redirect in Edimax BR-6208AC

0
Medium
VulnerabilityCVE-2025-15258cvecve-2025-15258
Published: Tue Dec 30 2025 (12/30/2025, 17:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Edimax
Product: BR-6208AC

Description

A weakness has been identified in Edimax BR-6208AC 1.02/1.03. Affected by this issue is the function formALGSetup of the file /goform/formALGSetup of the component Web-based Configuration Interface. This manipulation of the argument wlan-url causes open redirect. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. Edimax confirms this issue: "The product mentioned, EDIMAX BR-6208AC V2, has reached its End of Life (EOL) status. It is no longer supported or maintained by Edimax, and it is no longer available for purchase in the market. Consequently, there will be no further firmware updates or patches for this device. We recommend users upgrade to newer models for better security." This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

AILast updated: 12/30/2025, 22:34:09 UTC

Technical Analysis

The vulnerability identified as CVE-2025-15258 affects Edimax BR-6208AC routers running firmware versions 1.02 and 1.03. It resides in the web-based configuration interface, specifically in the formALGSetup function located at /goform/formALGSetup. The issue arises from improper validation of the wlan-url argument, which can be manipulated to cause an open redirect. An attacker can craft a URL that, when visited by a user, redirects them to a malicious external website without their consent. This can be exploited remotely without requiring authentication, though user interaction is necessary to trigger the redirect. The vulnerability does not impact the confidentiality, integrity, or availability of the router itself but can be leveraged for phishing attacks, credential theft, or distribution of malware by redirecting users to malicious sites. Edimax has confirmed that the BR-6208AC V2 model is End of Life, with no further firmware updates or patches planned, leaving the vulnerability unpatched. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity and availability, resulting in a medium severity score of 5.1. While no exploits are currently known to be active in the wild, the public availability of exploit code increases the risk of exploitation, especially in environments where these devices remain in use.

Potential Impact

For European organizations, the primary impact of this vulnerability lies in the potential for social engineering and phishing attacks facilitated by the open redirect. Users redirected to malicious sites may inadvertently disclose credentials or download malware, leading to broader network compromise. Although the vulnerability does not directly compromise the router’s core functions or network availability, it undermines user trust and can serve as a stepping stone for more sophisticated attacks. Organizations relying on Edimax BR-6208AC devices, especially in sectors with high user interaction such as education, small business, or public institutions, face increased risk. The lack of vendor support and patches means that these devices represent persistent security liabilities. Additionally, attackers may exploit this vulnerability to bypass security controls or redirect traffic to malicious infrastructure, potentially impacting confidentiality. The medium severity rating reflects these risks but also the limited scope of direct device compromise.

Mitigation Recommendations

Given the End of Life status of the Edimax BR-6208AC, no official patches or firmware updates are available. The most effective mitigation is to replace these devices with newer, supported models that receive regular security updates. In environments where immediate replacement is not feasible, organizations should restrict access to the router’s web interface to trusted internal networks only, using network segmentation and firewall rules to prevent external access. Implementing web filtering and DNS security controls can help block access to known malicious domains that could be used in redirect attacks. Educating users about the risks of clicking suspicious links and verifying URLs before interaction can reduce the likelihood of successful phishing attempts. Monitoring network traffic for unusual redirect patterns and employing intrusion detection systems can provide early warning of exploitation attempts. Finally, organizations should conduct regular audits to identify legacy devices and prioritize their replacement or isolation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-29T09:34:46.888Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450a4db813ff03e2be13d

Added to database: 12/30/2025, 10:22:28 PM

Last enriched: 12/30/2025, 10:34:09 PM

Last updated: 2/21/2026, 12:23:28 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats