{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14094","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-05T09:04:00.459Z","datePublished":"2025-12-05T17:02:05.688Z","dateUpdated":"2026-02-24T05:41:29.859Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T05:41:29.859Z"},"title":"Edimax BR-6478AC V3 formSysCmd sub_44CCE4 os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"Edimax","product":"BR-6478AC V3","versions":[{"version":"1.0.15","status":"affected"}],"cpes":["cpe:2.3:o:edimax:br-6478ac_v3_firmware:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in Edimax BR-6478AC V3 1.0.15. The affected element is the function sub_44CCE4 of the file /boafrm/formSysCmd. This manipulation of the argument sysCmd causes os command injection. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-05T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-05T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-12-12T06:12:25.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"KrisW (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.334484","name":"VDB-334484 | Edimax BR-6478AC V3 formSysCmd sub_44CCE4 os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.334484","name":"VDB-334484 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.696668","name":"Submit #696668 | EDIMAX BR-6478AC V3 1.0.15 Remote command execution","tags":["third-party-advisory"]},{"url":"https://github.com/Kriswu1337/CVE/blob/main/EDIMAX/1/3.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-08T17:41:12.929541Z","id":"CVE-2025-14094","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-08T17:41:57.097Z"}}]}}