Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70161: n/a

0
Critical
VulnerabilityCVE-2025-70161cvecve-2025-70161
Published: Fri Jan 09 2026 (01/09/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

EDIMAX BR-6208AC V2_1.02 is vulnerable to Command Injection. This arises because the pppUserName field is directly passed to a shell command via the system() function without proper sanitization. An attacker can exploit this by injecting malicious commands into the pppUserName field, allowing arbitrary code execution.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:57:54 UTC

Technical Analysis

The vulnerability identified as CVE-2025-70161 affects the EDIMAX BR-6208AC V2_1.02 router firmware. It is a command injection flaw (CWE-77) that occurs because the pppUserName parameter is directly passed to a shell command via the system() function without any sanitization or validation. This allows an unauthenticated remote attacker to inject arbitrary shell commands by manipulating the pppUserName field, leading to arbitrary code execution on the device. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, making it highly dangerous. The CVSS v3.1 score of 9.8 reflects the critical nature of this flaw, with impact on confidentiality, integrity, and availability rated as high. Successful exploitation could allow attackers to take full control of the router, intercept or manipulate network traffic, deploy malware, or pivot to internal networks. Although no public exploits are currently reported, the simplicity of the attack vector and the critical impact demand urgent attention. The lack of available patches at the time of disclosure increases the risk window for affected users. This vulnerability highlights the importance of input validation and secure coding practices in embedded network devices.

Potential Impact

For European organizations, this vulnerability poses a severe risk to network security and data protection. Compromise of the EDIMAX BR-6208AC routers could lead to unauthorized access to internal networks, interception of sensitive communications, and disruption of network availability. This is particularly critical for sectors such as finance, healthcare, government, and critical infrastructure, where network integrity and confidentiality are paramount. Attackers could leverage the vulnerability to establish persistent footholds, launch further attacks, or exfiltrate sensitive data. The widespread use of EDIMAX routers in small and medium enterprises and possibly home office environments increases the attack surface. Additionally, compromised routers could be used as part of botnets or for launching attacks against other targets, amplifying the threat. The absence of patches means organizations must rely on network-level mitigations until vendor updates are available.

Mitigation Recommendations

1. Immediately check for and apply any firmware updates or patches released by EDIMAX addressing CVE-2025-70161. 2. If no patch is available, disable remote management interfaces (e.g., WAN-side access to router configuration) to reduce exposure. 3. Segment networks to isolate vulnerable routers from critical assets and sensitive data. 4. Employ network intrusion detection systems (NIDS) to monitor for suspicious command injection patterns or unusual traffic to/from the router. 5. Change default credentials and enforce strong authentication policies to limit local exploitation risk. 6. Consider replacing affected devices with models from vendors with a stronger security track record if patches are delayed. 7. Regularly audit router configurations and logs for signs of compromise. 8. Educate IT staff on the risks of command injection and the importance of input validation in network devices. 9. Implement strict firewall rules to restrict management traffic to trusted sources only.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69614fa0047de42cfc79a3ab

Added to database: 1/9/2026, 6:57:36 PM

Last enriched: 1/17/2026, 7:57:54 AM

Last updated: 2/6/2026, 9:14:22 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats