๐Ÿ” CVE Alert

CVE-2025-15257

HIGH 7.3

Edimax BR-6208AC Web-based Configuration formRoute command injection

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A security flaw has been discovered in Edimax BR-6208AC 1.02/1.03. Affected by this vulnerability is the function formRoute of the file /gogorm/formRoute of the component Web-based Configuration Interface. The manipulation of the argument strIp/strMask/strGateway results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. Edimax confirms this issue: "The product mentioned, EDIMAX BR-6208AC V2, has reached its End of Life (EOL) status. It is no longer supported or maintained by Edimax, and it is no longer available for purchase in the market. Consequently, there will be no further firmware updates or patches for this device. We recommend users upgrade to newer models for better security." This vulnerability only affects products that are no longer supported by the maintainer.

CWE CWE-77 CWE-74
Vendor edimax
Product br-6208ac
Published Dec 30, 2025
Last Updated Feb 24, 2026
Stay Ahead of the Next One

Get instant alerts for edimax br-6208ac

Be the first to know when new high vulnerabilities affecting edimax br-6208ac are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Edimax / BR-6208AC
1.02 1.03

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.338647 vuldb.com: https://vuldb.com/?ctiid.338647 vuldb.com: https://vuldb.com/?submit.722426 tzh00203.notion.site: https://tzh00203.notion.site/EDIMAX-BR-6208AC-V2_1-02-Command-Injection-Vulnerability-in-Web-formRoute-handler-2d3b5c52018a805983d3cf0780b28407?source=copy_link

Credits

๐Ÿ” tian (VulDB User)