CVE-2025-15258: Open Redirect in Edimax BR-6208AC
A weakness has been identified in Edimax BR-6208AC 1.02/1.03. Affected by this issue is the function formALGSetup of the file /goform/formALGSetup of the component Web-based Configuration Interface. This manipulation of the argument wlan-url causes open redirect. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. Edimax confirms this issue: "The product mentioned, EDIMAX BR-6208AC V2, has reached its End of Life (EOL) status. It is no longer supported or maintained by Edimax, and it is no longer available for purchase in the market. Consequently, there will be no further firmware updates or patches for this device. We recommend users upgrade to newer models for better security." This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2025-15258 identifies an open redirect vulnerability in the Edimax BR-6208AC V2 router, specifically in firmware versions 1.02 and 1.03. The vulnerability resides in the web-based configuration interface's formALGSetup function, where the wlan-url parameter is improperly validated, allowing attackers to redirect users to arbitrary external URLs. This type of vulnerability can be exploited remotely without authentication, but requires user interaction, such as clicking a maliciously crafted link. Open redirects can be leveraged in phishing campaigns to trick users into visiting malicious websites appearing to originate from a trusted source, potentially facilitating further attacks like credential theft or malware distribution. Edimax has confirmed that the BR-6208AC V2 model is end-of-life and no longer supported, meaning no firmware patches or updates will be released to address this issue. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity and availability, resulting in a medium severity rating with a score of 5.1. Although no active exploits have been reported in the wild, the public availability of exploit code increases the likelihood of exploitation attempts. The vulnerability affects only legacy devices, but those devices may still be deployed in some environments, especially where hardware replacement cycles are slow or budgets limited. The lack of vendor support necessitates alternative mitigation strategies such as network segmentation, web filtering, or device replacement to reduce risk.
Potential Impact
The primary impact of this vulnerability is the potential for attackers to conduct phishing or social engineering attacks by redirecting users from the trusted router interface to malicious websites. This can lead to credential compromise, malware infection, or further exploitation of user systems. While the vulnerability does not directly compromise the router’s confidentiality, integrity, or availability, it undermines user trust and can serve as a stepping stone for more severe attacks. Organizations relying on the Edimax BR-6208AC V2 routers may face increased risk of targeted phishing campaigns against their users or administrators. Since the device is no longer supported, the inability to patch the vulnerability prolongs exposure and complicates remediation efforts. This can be particularly impactful in environments where these routers provide critical network access or are used in sensitive operational contexts. The medium severity rating reflects the moderate risk posed by the vulnerability, balancing ease of exploitation with limited direct device compromise. However, the broader security posture of affected organizations can be degraded if attackers successfully leverage the open redirect for downstream attacks.
Mitigation Recommendations
Given the end-of-life status of the Edimax BR-6208AC V2 and absence of vendor patches, the most effective mitigation is to replace affected devices with newer, supported models that receive regular security updates. Until replacement is feasible, organizations should implement network-level controls such as web filtering or proxy solutions to block access to known malicious URLs and monitor for suspicious redirect activity. Administrators should educate users about the risks of clicking unexpected links, especially those purporting to originate from router interfaces. Network segmentation can limit exposure by isolating legacy devices from critical systems and sensitive data. Additionally, disabling remote management features or restricting access to the router’s web interface to trusted internal networks can reduce the attack surface. Logging and monitoring of router access logs may help detect exploitation attempts. Finally, organizations should maintain an inventory of network devices to identify and prioritize replacement of unsupported hardware.
Affected Countries
United States, Germany, Japan, Taiwan, South Korea, United Kingdom, France, Australia, Canada, Netherlands
CVE-2025-15258: Open Redirect in Edimax BR-6208AC
Description
A weakness has been identified in Edimax BR-6208AC 1.02/1.03. Affected by this issue is the function formALGSetup of the file /goform/formALGSetup of the component Web-based Configuration Interface. This manipulation of the argument wlan-url causes open redirect. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. Edimax confirms this issue: "The product mentioned, EDIMAX BR-6208AC V2, has reached its End of Life (EOL) status. It is no longer supported or maintained by Edimax, and it is no longer available for purchase in the market. Consequently, there will be no further firmware updates or patches for this device. We recommend users upgrade to newer models for better security." This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15258 identifies an open redirect vulnerability in the Edimax BR-6208AC V2 router, specifically in firmware versions 1.02 and 1.03. The vulnerability resides in the web-based configuration interface's formALGSetup function, where the wlan-url parameter is improperly validated, allowing attackers to redirect users to arbitrary external URLs. This type of vulnerability can be exploited remotely without authentication, but requires user interaction, such as clicking a maliciously crafted link. Open redirects can be leveraged in phishing campaigns to trick users into visiting malicious websites appearing to originate from a trusted source, potentially facilitating further attacks like credential theft or malware distribution. Edimax has confirmed that the BR-6208AC V2 model is end-of-life and no longer supported, meaning no firmware patches or updates will be released to address this issue. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction needed, and limited impact on integrity and availability, resulting in a medium severity rating with a score of 5.1. Although no active exploits have been reported in the wild, the public availability of exploit code increases the likelihood of exploitation attempts. The vulnerability affects only legacy devices, but those devices may still be deployed in some environments, especially where hardware replacement cycles are slow or budgets limited. The lack of vendor support necessitates alternative mitigation strategies such as network segmentation, web filtering, or device replacement to reduce risk.
Potential Impact
The primary impact of this vulnerability is the potential for attackers to conduct phishing or social engineering attacks by redirecting users from the trusted router interface to malicious websites. This can lead to credential compromise, malware infection, or further exploitation of user systems. While the vulnerability does not directly compromise the router’s confidentiality, integrity, or availability, it undermines user trust and can serve as a stepping stone for more severe attacks. Organizations relying on the Edimax BR-6208AC V2 routers may face increased risk of targeted phishing campaigns against their users or administrators. Since the device is no longer supported, the inability to patch the vulnerability prolongs exposure and complicates remediation efforts. This can be particularly impactful in environments where these routers provide critical network access or are used in sensitive operational contexts. The medium severity rating reflects the moderate risk posed by the vulnerability, balancing ease of exploitation with limited direct device compromise. However, the broader security posture of affected organizations can be degraded if attackers successfully leverage the open redirect for downstream attacks.
Mitigation Recommendations
Given the end-of-life status of the Edimax BR-6208AC V2 and absence of vendor patches, the most effective mitigation is to replace affected devices with newer, supported models that receive regular security updates. Until replacement is feasible, organizations should implement network-level controls such as web filtering or proxy solutions to block access to known malicious URLs and monitor for suspicious redirect activity. Administrators should educate users about the risks of clicking unexpected links, especially those purporting to originate from router interfaces. Network segmentation can limit exposure by isolating legacy devices from critical systems and sensitive data. Additionally, disabling remote management features or restricting access to the router’s web interface to trusted internal networks can reduce the attack surface. Logging and monitoring of router access logs may help detect exploitation attempts. Finally, organizations should maintain an inventory of network devices to identify and prioritize replacement of unsupported hardware.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-29T09:34:46.888Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450a4db813ff03e2be13d
Added to database: 12/30/2025, 10:22:28 PM
Last enriched: 2/24/2026, 10:44:44 PM
Last updated: 4/5/2026, 12:17:33 AM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.