CVE-2026-1970: Open Redirect in Edimax BR-6258n
A flaw has been found in Edimax BR-6258n up to 1.18. This issue affects the function formStaDrvSetup of the file /goform/formStaDrvSetup. This manipulation of the argument submit-url causes open redirect. The attack can be initiated remotely. The exploit has been published and may be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.
AI Analysis
Technical Summary
CVE-2026-1970 is an open redirect vulnerability identified in the Edimax BR-6258n wireless router firmware versions 1.0 through 1.18. The vulnerability resides in the formStaDrvSetup function within the /goform/formStaDrvSetup endpoint. Specifically, the submit-url argument is improperly validated, allowing an attacker to craft a URL that causes the router's web interface to redirect users to arbitrary external URLs. This type of vulnerability can be exploited remotely without requiring authentication, making it accessible to attackers scanning for vulnerable devices exposed on the internet or internal networks. However, exploitation requires user interaction, such as clicking a malicious link that triggers the redirect. The vendor has confirmed the product is end-of-life and has not issued a patch, though a consolidated security advisory is planned. The vulnerability has a CVSS 4.0 base score of 5.1 (medium severity), reflecting its moderate impact on confidentiality and integrity, with no direct impact on availability. While no known exploits are currently in the wild, proof-of-concept code has been published, increasing the risk of exploitation. The open redirect can be leveraged in phishing campaigns or to bypass security filters by redirecting users to malicious sites under attacker control. Since the product is no longer supported, affected organizations face challenges in remediation, often requiring device replacement or network-level mitigations.
Potential Impact
The primary impact of CVE-2026-1970 is the facilitation of phishing and social engineering attacks through open redirect abuse. Attackers can lure users into clicking URLs that appear legitimate but redirect to malicious websites hosting malware, credential harvesting pages, or other scams. This can lead to compromised user credentials, malware infections, or further network compromise. Although the vulnerability does not directly allow code execution or denial of service, it undermines user trust in the affected device’s web interface and can be a stepping stone for more complex attacks. Organizations relying on Edimax BR-6258n routers may face increased risk of targeted phishing campaigns, especially if these devices are accessible from untrusted networks. The lack of vendor support and patches exacerbates the risk, as vulnerable devices remain exposed. Additionally, the presence of such vulnerabilities in network infrastructure devices can affect overall network security posture and compliance with security standards.
Mitigation Recommendations
Given the end-of-life status of the Edimax BR-6258n and absence of patches, the most effective mitigation is to replace the affected routers with supported models that receive regular security updates. If immediate replacement is not feasible, organizations should implement network segmentation to isolate these devices from critical systems and restrict access to their management interfaces to trusted networks only. Deploying web filtering and intrusion prevention systems can help detect and block malicious URLs and redirect attempts. Administrators should disable remote management features if enabled and enforce strong access controls. Educating users about the risks of clicking suspicious links and verifying URLs can reduce the likelihood of successful exploitation. Monitoring network traffic for unusual redirect patterns or external connections originating from router management interfaces can provide early detection of exploitation attempts. Finally, organizations should maintain an inventory of legacy devices and prioritize their upgrade or decommissioning to reduce attack surface.
Affected Countries
United States, China, Taiwan, Japan, South Korea, Germany, United Kingdom, France, Canada, Australia
CVE-2026-1970: Open Redirect in Edimax BR-6258n
Description
A flaw has been found in Edimax BR-6258n up to 1.18. This issue affects the function formStaDrvSetup of the file /goform/formStaDrvSetup. This manipulation of the argument submit-url causes open redirect. The attack can be initiated remotely. The exploit has been published and may be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1970 is an open redirect vulnerability identified in the Edimax BR-6258n wireless router firmware versions 1.0 through 1.18. The vulnerability resides in the formStaDrvSetup function within the /goform/formStaDrvSetup endpoint. Specifically, the submit-url argument is improperly validated, allowing an attacker to craft a URL that causes the router's web interface to redirect users to arbitrary external URLs. This type of vulnerability can be exploited remotely without requiring authentication, making it accessible to attackers scanning for vulnerable devices exposed on the internet or internal networks. However, exploitation requires user interaction, such as clicking a malicious link that triggers the redirect. The vendor has confirmed the product is end-of-life and has not issued a patch, though a consolidated security advisory is planned. The vulnerability has a CVSS 4.0 base score of 5.1 (medium severity), reflecting its moderate impact on confidentiality and integrity, with no direct impact on availability. While no known exploits are currently in the wild, proof-of-concept code has been published, increasing the risk of exploitation. The open redirect can be leveraged in phishing campaigns or to bypass security filters by redirecting users to malicious sites under attacker control. Since the product is no longer supported, affected organizations face challenges in remediation, often requiring device replacement or network-level mitigations.
Potential Impact
The primary impact of CVE-2026-1970 is the facilitation of phishing and social engineering attacks through open redirect abuse. Attackers can lure users into clicking URLs that appear legitimate but redirect to malicious websites hosting malware, credential harvesting pages, or other scams. This can lead to compromised user credentials, malware infections, or further network compromise. Although the vulnerability does not directly allow code execution or denial of service, it undermines user trust in the affected device’s web interface and can be a stepping stone for more complex attacks. Organizations relying on Edimax BR-6258n routers may face increased risk of targeted phishing campaigns, especially if these devices are accessible from untrusted networks. The lack of vendor support and patches exacerbates the risk, as vulnerable devices remain exposed. Additionally, the presence of such vulnerabilities in network infrastructure devices can affect overall network security posture and compliance with security standards.
Mitigation Recommendations
Given the end-of-life status of the Edimax BR-6258n and absence of patches, the most effective mitigation is to replace the affected routers with supported models that receive regular security updates. If immediate replacement is not feasible, organizations should implement network segmentation to isolate these devices from critical systems and restrict access to their management interfaces to trusted networks only. Deploying web filtering and intrusion prevention systems can help detect and block malicious URLs and redirect attempts. Administrators should disable remote management features if enabled and enforce strong access controls. Educating users about the risks of clicking suspicious links and verifying URLs can reduce the likelihood of successful exploitation. Monitoring network traffic for unusual redirect patterns or external connections originating from router management interfaces can provide early detection of exploitation attempts. Finally, organizations should maintain an inventory of legacy devices and prioritize their upgrade or decommissioning to reduce attack surface.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-05T13:19:47.470Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6985166df9fa50a62f44dae1
Added to database: 2/5/2026, 10:15:09 PM
Last enriched: 2/23/2026, 10:01:27 PM
Last updated: 3/23/2026, 5:00:19 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.