CVE-2020-37125
Edimax · EW-7438RPn-v3 Mini
An unauthenticated remote code execution vulnerability in the Edimax EW-7438RPn-v3 Mini allows attackers to execute arbitrary commands via the /goform/mp endpoint.
Executive summary
A critical unauthenticated remote code execution vulnerability in Edimax Wi-Fi extenders allows attackers to take full control of the device by sending crafted POST requests.
Vulnerability
The vulnerability is located in the /goform/mp web endpoint. It allows an unauthenticated attacker to perform command injection by sending a crafted POST request. This enables the attacker to download and execute malicious scripts directly on the device hardware.
Business impact
Compromised Wi-Fi extenders can be used as persistent entry points into a corporate or home network. Attackers can perform man-in-the-middle attacks, sniff network traffic, or use the device as part of a botnet for DDoS attacks. The CVSS score of 9.8 reflects the ease of exploitation and the total compromise of the affected hardware.
Remediation
Immediate Action: Update the firmware of the Edimax EW-7438RPn-v3 Mini to the latest version immediately. If the device is end-of-life, it should be replaced.
Proactive Monitoring: Monitor network traffic for unusual POST requests to the /goform/mp endpoint and watch for unauthorized outbound connections from IoT devices.
Compensating Controls: Place IoT devices like Wi-Fi extenders on a segregated VLAN with no access to sensitive internal resources or the management interfaces of other devices.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The ability for an unauthenticated attacker to execute commands remotely makes this a critical security risk. We recommend that organizations and individuals using these Edimax devices verify their firmware versions immediately. If a patch is not available from the vendor, the device should be decommissioned to prevent it from becoming a liability.