Cyber Posture

CVE-2020-37125

CriticalPublic PoC

Published: 05 February 2026

Published
05 February 2026
Modified
18 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0056 68.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Edimax EW-7438RPn-v3 Mini 1.27 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands through the /goform/mp endpoint. Attackers can exploit the vulnerability by sending crafted POST requests with command injection payloads to download and execute…

more

malicious scripts on the device.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents OS command injection by validating and sanitizing inputs to the vulnerable /goform/mp endpoint.

prevent

Prohibits unauthenticated access to dangerous endpoints like /goform/mp that allow arbitrary command execution.

prevent

Requires identification, reporting, and remediation of the specific command injection flaw in firmware version 1.27.

Security SummaryAI

CVE-2020-37125 is a remote code execution vulnerability in the Edimax EW-7438RPn-v3 Mini Wi-Fi range extender running firmware version 1.27. The issue stems from OS command injection (CWE-78) in the /goform/mp endpoint, where unauthenticated attackers can send crafted POST requests containing command injection payloads to execute arbitrary commands on the device, including downloading and running malicious scripts.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable over the network by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation grants attackers high-impact control over confidentiality, integrity, and availability, enabling full remote command execution on the affected device.

Advisories and related resources include the Edimax product page at https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/, an Exploit-DB entry at https://www.exploit-db.com/exploits/48318, and a Vulncheck advisory at https://www.vulncheck.com/advisories/edimax-technology-ew-rpn-mini-remote-code-execution. Practitioners should review these for any patch or mitigation guidance specific to the device firmware.

Details

CWE(s)

Affected Products

edimax
ew-7438rpn mini firmware
1.27

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an unauthenticated OS command injection in a public-facing web endpoint (/goform/mp) on a network device, directly enabling remote code execution via exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References