{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14093","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-05T09:03:57.744Z","datePublished":"2025-12-05T16:32:05.836Z","dateUpdated":"2026-02-24T05:41:17.143Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T05:41:17.143Z"},"title":"Edimax BR-6478AC V3 formTracerouteDiagnosticRun sub_416990 os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"Edimax","product":"BR-6478AC V3","versions":[{"version":"1.0.15","status":"affected"}],"cpes":["cpe:2.3:o:edimax:br-6478ac_v3_firmware:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in Edimax BR-6478AC V3 1.0.15. Impacted is the function sub_416990 of the file /boafrm/formTracerouteDiagnosticRun. The manipulation of the argument host results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-05T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-12T06:12:24.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"KrisW (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.334483","name":"VDB-334483 | Edimax BR-6478AC V3 formTracerouteDiagnosticRun sub_416990 os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.334483","name":"VDB-334483 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.696633","name":"Submit #696633 | EDIMAX BR-6478AC V3 1.0.15 Remote command execution","tags":["third-party-advisory"]},{"url":"https://github.com/Kriswu1337/CVE/blob/main/EDIMAX/1/2.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-05T19:54:21.946530Z","id":"CVE-2025-14093","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-05T19:55:44.196Z"}}]}}