Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1970: Open Redirect in Edimax BR-6258n

0
Medium
VulnerabilityCVE-2026-1970cvecve-2026-1970
Published: Thu Feb 05 2026 (02/05/2026, 22:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Edimax
Product: BR-6258n

Description

A flaw has been found in Edimax BR-6258n up to 1.18. This issue affects the function formStaDrvSetup of the file /goform/formStaDrvSetup. This manipulation of the argument submit-url causes open redirect. The attack can be initiated remotely. The exploit has been published and may be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:01:27 UTC

Technical Analysis

CVE-2026-1970 is an open redirect vulnerability identified in the Edimax BR-6258n wireless router firmware versions 1.0 through 1.18. The vulnerability resides in the formStaDrvSetup function within the /goform/formStaDrvSetup endpoint. Specifically, the submit-url argument is improperly validated, allowing an attacker to craft a URL that causes the router's web interface to redirect users to arbitrary external URLs. This type of vulnerability can be exploited remotely without requiring authentication, making it accessible to attackers scanning for vulnerable devices exposed on the internet or internal networks. However, exploitation requires user interaction, such as clicking a malicious link that triggers the redirect. The vendor has confirmed the product is end-of-life and has not issued a patch, though a consolidated security advisory is planned. The vulnerability has a CVSS 4.0 base score of 5.1 (medium severity), reflecting its moderate impact on confidentiality and integrity, with no direct impact on availability. While no known exploits are currently in the wild, proof-of-concept code has been published, increasing the risk of exploitation. The open redirect can be leveraged in phishing campaigns or to bypass security filters by redirecting users to malicious sites under attacker control. Since the product is no longer supported, affected organizations face challenges in remediation, often requiring device replacement or network-level mitigations.

Potential Impact

The primary impact of CVE-2026-1970 is the facilitation of phishing and social engineering attacks through open redirect abuse. Attackers can lure users into clicking URLs that appear legitimate but redirect to malicious websites hosting malware, credential harvesting pages, or other scams. This can lead to compromised user credentials, malware infections, or further network compromise. Although the vulnerability does not directly allow code execution or denial of service, it undermines user trust in the affected device’s web interface and can be a stepping stone for more complex attacks. Organizations relying on Edimax BR-6258n routers may face increased risk of targeted phishing campaigns, especially if these devices are accessible from untrusted networks. The lack of vendor support and patches exacerbates the risk, as vulnerable devices remain exposed. Additionally, the presence of such vulnerabilities in network infrastructure devices can affect overall network security posture and compliance with security standards.

Mitigation Recommendations

Given the end-of-life status of the Edimax BR-6258n and absence of patches, the most effective mitigation is to replace the affected routers with supported models that receive regular security updates. If immediate replacement is not feasible, organizations should implement network segmentation to isolate these devices from critical systems and restrict access to their management interfaces to trusted networks only. Deploying web filtering and intrusion prevention systems can help detect and block malicious URLs and redirect attempts. Administrators should disable remote management features if enabled and enforce strong access controls. Educating users about the risks of clicking suspicious links and verifying URLs can reduce the likelihood of successful exploitation. Monitoring network traffic for unusual redirect patterns or external connections originating from router management interfaces can provide early detection of exploitation attempts. Finally, organizations should maintain an inventory of legacy devices and prioritize their upgrade or decommissioning to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-05T13:19:47.470Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6985166df9fa50a62f44dae1

Added to database: 2/5/2026, 10:15:09 PM

Last enriched: 2/23/2026, 10:01:27 PM

Last updated: 3/23/2026, 5:00:19 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses