Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32842: CWE-312 Cleartext storage of sensitive information in EDIMAX Technology Co., Ltd. Edimax GS-5008PL

0
High
VulnerabilityCVE-2026-32842cvecve-2026-32842cwe-312
Published: Tue Mar 17 2026 (03/17/2026, 21:41:55 UTC)
Source: CVE Database V5
Vendor/Project: EDIMAX Technology Co., Ltd.
Product: Edimax GS-5008PL

Description

Edimax GS-5008PL firmware version 1.00.54 and prior contain an insecure credential storage vulnerability that allows attackers to obtain administrator credentials by accessing configuration backup files. Attackers can download the config.bin file through fupload.cgi to extract plaintext username and password fields for unauthorized administrative access.

AI-Powered Analysis

AILast updated: 03/17/2026, 22:12:42 UTC

Technical Analysis

CVE-2026-32842 is a vulnerability identified in the Edimax GS-5008PL network device firmware version 1.00.54 and prior. The root cause is the insecure storage of administrator credentials in plaintext within the device's configuration backup file named config.bin. This file can be accessed and downloaded unauthenticated through the fupload.cgi endpoint, which is exposed on the device's management interface. Once obtained, attackers can extract the plaintext username and password fields from the config.bin file, enabling them to gain unauthorized administrative access to the device. This vulnerability is classified under CWE-312, indicating cleartext storage of sensitive information. The CVSS v4.0 base score is 7.1 (high severity), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and a high impact on confidentiality. The vulnerability affects the confidentiality and integrity of the device by exposing administrative credentials, which could lead to further compromise such as device configuration manipulation, network traffic interception, or lateral movement within the network. No patches or firmware updates have been linked yet, and no known exploits have been reported in the wild as of the publication date. The vulnerability is particularly concerning because it allows remote unauthenticated attackers to access sensitive credentials without any user interaction, increasing the risk of exploitation in exposed network environments.

Potential Impact

The primary impact of CVE-2026-32842 is the compromise of administrator credentials for Edimax GS-5008PL devices. Unauthorized access to these devices can lead to full administrative control, allowing attackers to alter device configurations, disable security features, intercept or redirect network traffic, and potentially pivot to other systems within the network. This can result in significant confidentiality breaches, loss of data integrity, and potential availability disruptions if the device is misconfigured or disabled. Organizations relying on these devices for network connectivity or security may face operational disruptions, data exfiltration, or further network compromise. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where these devices are exposed to untrusted networks or the internet. The lack of current patches exacerbates the risk, making timely mitigation critical. Additionally, the exposure of administrative credentials can undermine trust in network infrastructure and complicate incident response efforts.

Mitigation Recommendations

To mitigate CVE-2026-32842, organizations should first verify if they are using Edimax GS-5008PL devices with firmware version 1.00.54 or earlier. If so, they should immediately restrict access to the device management interfaces by implementing network segmentation and firewall rules to limit access only to trusted administrators and internal management networks. Disabling remote management or restricting it via VPN or secure tunnels can reduce exposure. Since no official patches are currently available, organizations should monitor Edimax vendor communications for firmware updates addressing this vulnerability and apply them promptly once released. Additionally, administrators should avoid creating or downloading configuration backups on untrusted networks and securely delete any existing config.bin files containing sensitive information. Regularly auditing device configurations and monitoring network traffic for suspicious activity can help detect exploitation attempts. Employing strong, unique administrative passwords and considering multi-factor authentication where supported can further reduce risk. Finally, organizations should consider replacing vulnerable devices if timely patches are not forthcoming or if the risk is unacceptable.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-16T18:11:41.758Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b9ce80771bdb1749db6354

Added to database: 3/17/2026, 9:58:24 PM

Last enriched: 3/17/2026, 10:12:42 PM

Last updated: 3/18/2026, 5:22:24 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses