Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32839: CWE-352 Cross-Site request forgery (CSRF) in EDIMAX Technology Co., Ltd. Edimax GS-5008PL

0
Medium
VulnerabilityCVE-2026-32839cvecve-2026-32839cwe-352
Published: Tue Mar 17 2026 (03/17/2026, 21:42:21 UTC)
Source: CVE Database V5
Vendor/Project: EDIMAX Technology Co., Ltd.
Product: Edimax GS-5008PL

Description

CVE-2026-32839 is a medium-severity cross-site request forgery (CSRF) vulnerability affecting Edimax GS-5008PL firmware version 1. 00. 54 and earlier. The vulnerability allows remote attackers to induce logged-in administrators to perform unauthorized administrative actions by visiting malicious web pages. Exploitation does not require authentication or privileges but does require user interaction (administrator visiting a crafted page). Attackers can change device passwords, upload malicious firmware, reboot the device, reset it to factory defaults, or modify network configurations. No anti-CSRF tokens or request validation mechanisms are present to prevent these actions. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to device integrity and network security. Organizations using this device should prioritize mitigation to prevent unauthorized control and potential network compromise.

AI-Powered Analysis

AILast updated: 03/17/2026, 22:14:02 UTC

Technical Analysis

The Edimax GS-5008PL network switch running firmware version 1.00.54 and prior contains a cross-site request forgery (CSRF) vulnerability identified as CVE-2026-32839 (CWE-352). This vulnerability arises due to the absence of anti-CSRF tokens and inadequate request validation in the device's web management interface. As a result, an attacker can craft malicious web pages that, when visited by an authenticated administrator, cause the device to execute unauthorized administrative commands without the administrator's consent. These commands include changing administrative passwords, uploading new firmware images, rebooting the device, performing factory resets, and modifying network settings. The vulnerability does not require the attacker to have any privileges or prior authentication, but it does require the administrator to interact with the malicious content (user interaction). The CVSS 4.0 base score is 5.1, reflecting medium severity, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The vulnerability impacts device confidentiality, integrity, and availability by enabling full administrative control through CSRF attacks. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild as of the publication date.

Potential Impact

This vulnerability can have significant consequences for organizations deploying the Edimax GS-5008PL switches. Unauthorized administrative actions can lead to complete device takeover, allowing attackers to change passwords and lock out legitimate administrators, upload malicious firmware to implant persistent backdoors, reboot devices causing network downtime, reset configurations to disrupt network operations, or alter network settings to redirect or intercept traffic. Such control compromises the confidentiality, integrity, and availability of the network infrastructure. In environments where these switches serve critical roles, such as enterprise networks, data centers, or industrial control systems, exploitation could lead to operational disruptions, data breaches, or lateral movement within the network. The requirement for user interaction limits automated exploitation but targeted phishing or social engineering campaigns against network administrators could enable successful attacks. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed given the vulnerability details.

Mitigation Recommendations

Organizations should immediately assess their deployment of Edimax GS-5008PL devices and verify firmware versions. Since no official patches are currently linked, mitigation should focus on reducing exposure: 1) Restrict access to the device's management interface to trusted networks and IP addresses only, using network segmentation and firewall rules. 2) Educate administrators to avoid visiting untrusted or suspicious web pages while logged into device management consoles. 3) Implement multi-factor authentication if supported to reduce risk from compromised credentials. 4) Monitor network traffic and device logs for unusual administrative actions or firmware uploads. 5) Consider isolating the device management interface from general user networks to prevent CSRF attack vectors. 6) Engage with Edimax for firmware updates or patches addressing this vulnerability and plan timely updates once available. 7) Employ web browser security features or extensions that block cross-site requests or scripts from untrusted origins to reduce CSRF risks. 8) Regularly back up device configurations to enable rapid recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-16T18:11:41.757Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b9ce80771bdb1749db6345

Added to database: 3/17/2026, 9:58:24 PM

Last enriched: 3/17/2026, 10:14:02 PM

Last updated: 3/18/2026, 5:22:25 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses