Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL

0
Medium
VulnerabilityCVE-2026-1971cvecve-2026-1971
Published: Fri Feb 06 2026 (02/06/2026, 00:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Edimax
Product: BR-6288ACL

Description

A vulnerability has been found in Edimax BR-6288ACL up to 1.12. Impacted is the function wiz_WISP24gmanual of the file wiz_WISP24gmanual.asp. Such manipulation of the argument manualssid leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:01:41 UTC

Technical Analysis

CVE-2026-1971 is a cross-site scripting vulnerability affecting Edimax BR-6288ACL routers running firmware versions up to 1.12. The flaw exists in the wiz_WISP24gmanual.asp file, specifically within the wiz_WISP24gmanual function, where the manualssid parameter is not properly sanitized. This allows an attacker to craft a malicious URL that injects arbitrary JavaScript code, which executes in the context of the victim's browser when they access the vulnerable interface. The attack vector is remote and does not require prior authentication, but successful exploitation requires user interaction, such as clicking a malicious link. The vulnerability can lead to theft of sensitive information like session cookies or credentials, enabling further attacks such as session hijacking or unauthorized configuration changes. The vendor has declared the product end-of-life and has not released a patch, though a consolidated security advisory is forthcoming. The CVSS 4.0 score is 4.8 (medium severity), reflecting the moderate impact and exploitation complexity. No known exploits have been observed in the wild yet, but public disclosure increases the likelihood of exploitation attempts. The vulnerability affects a niche set of legacy devices, limiting its scope but posing risks to organizations still using these routers without mitigation.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of the affected systems. Successful exploitation allows attackers to execute arbitrary scripts in the context of the router's web interface, potentially stealing session tokens, credentials, or performing unauthorized actions on behalf of the user. This can lead to unauthorized access to router configuration, network traffic interception, or pivoting to internal network resources. Since the device is often used in small office or home office environments, compromised routers could serve as entry points for broader network attacks. The lack of vendor support and patches increases the risk for organizations that continue to use these devices, as they remain exposed to emerging exploit techniques. The medium CVSS score reflects the moderate ease of exploitation and limited scope, but the impact on network security posture can be significant if exploited. The absence of known exploits in the wild currently limits immediate widespread impact, but the public disclosure may lead to increased targeting.

Mitigation Recommendations

Given the end-of-life status of the Edimax BR-6288ACL and absence of patches, organizations should prioritize device replacement with supported models that receive regular security updates. If immediate replacement is not feasible, network segmentation should be implemented to isolate the vulnerable device from critical assets and limit exposure. Disable remote management interfaces or restrict access to trusted IP addresses only. Employ web filtering or intrusion detection systems to detect and block suspicious URLs or payloads targeting the manualssid parameter. Educate users about the risks of clicking unsolicited links, especially those related to router management interfaces. Regularly audit network devices to identify legacy or unsupported hardware and develop a phased decommissioning plan. Monitor vendor communications for the forthcoming consolidated security advisory and apply any recommended mitigations promptly. Consider deploying network-level protections such as DNS filtering or proxy solutions to reduce the risk of successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-05T13:19:52.077Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69853611f9fa50a62f554b79

Added to database: 2/6/2026, 12:30:09 AM

Last enriched: 2/23/2026, 10:01:41 PM

Last updated: 3/22/2026, 4:08:51 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses