Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC

0
Medium
VulnerabilityCVE-2026-1972cvecve-2026-1972
Published: Fri Feb 06 2026 (02/06/2026, 01:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Edimax
Product: BR-6208AC

Description

A vulnerability was found in Edimax BR-6208AC 2_1.02. The affected element is the function auth_check_userpass2. Performing a manipulation of the argument Username/Password results in use of default credentials. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:01:55 UTC

Technical Analysis

CVE-2026-1972 identifies a security vulnerability in the Edimax BR-6208AC router firmware version 2_1.02, specifically in the authentication function auth_check_userpass2. This function improperly handles username and password arguments, resulting in the acceptance of default credentials remotely without requiring authentication or user interaction. Attackers can exploit this flaw to gain unauthorized administrative access to the device, potentially allowing full control over router settings and network traffic. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges or user interaction needed. The vendor has declared the product end-of-life and has not released patches, only promising a consolidated advisory. Although no known exploits are currently widespread, public proof-of-concept code exists, increasing the risk of exploitation. The vulnerability impacts confidentiality and integrity by enabling attackers to intercept, modify, or redirect network communications. The lack of vendor support and patch availability means affected devices remain vulnerable indefinitely unless replaced or isolated. This vulnerability highlights the risks of default credential use and the importance of device lifecycle management in network security.

Potential Impact

The vulnerability allows remote attackers to bypass authentication using default credentials, granting full administrative access to the affected router. This can lead to unauthorized configuration changes, interception of sensitive data, network traffic manipulation, and potential pivoting to other internal systems. Organizations using the Edimax BR-6208AC in critical network segments risk data breaches, service disruptions, and loss of network integrity. The end-of-life status of the product means no official patches will be provided, increasing exposure duration. Attackers exploiting this vulnerability can compromise confidentiality by capturing unencrypted traffic, integrity by altering data flows, and availability if the router is misconfigured or disabled. The medium CVSS score reflects the significant impact but also the limited scope to this specific device and firmware version. However, the ease of exploitation and remote attack vector make it a notable threat for networks still relying on this hardware.

Mitigation Recommendations

Since the Edimax BR-6208AC is end-of-life with no patches available, organizations should prioritize replacing the affected devices with supported models that receive security updates. Until replacement, affected routers should be isolated from untrusted networks and management interfaces restricted to trusted internal IPs only. Network segmentation can limit exposure by placing these devices in separate VLANs or behind firewalls. Change default credentials immediately if possible, although this vulnerability may bypass such changes, so reliance on credential changes alone is insufficient. Monitor network traffic for unusual access patterns or unauthorized configuration changes. Disable remote management features if not required. Implement network intrusion detection systems to alert on exploitation attempts. Maintain an asset inventory to identify and track end-of-life devices and plan timely decommissioning. Engage with Edimax support channels for any consolidated advisories and follow best practices for secure router configuration.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-05T13:19:55.727Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69854420f9fa50a62f6d5e77

Added to database: 2/6/2026, 1:30:08 AM

Last enriched: 2/23/2026, 10:01:55 PM

Last updated: 3/22/2026, 9:42:37 PM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses