CVE-2025-14094
Published: 05 December 2025
Description
A flaw has been found in Edimax BR-6478AC V3 1.0.15. The affected element is the function sub_44CCE4 of the file /boafrm/formSysCmd. This manipulation of the argument sysCmd causes os command injection. The attack may be initiated remotely. The exploit has…
more
been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents OS command injection by implementing input validation mechanisms on the vulnerable sysCmd argument in /boafrm/formSysCmd.
Mandates timely remediation of the identified command injection flaw through patches, configuration changes, workarounds, or device replacement despite vendor non-response.
Minimizes exposure to the vulnerable sysCmd function by prohibiting or restricting non-essential system command execution capabilities.
Security SummaryAI
CVE-2025-14094 is an OS command injection vulnerability affecting the Edimax BR-6478AC V3 firmware version 1.0.15. The flaw exists in the function sub_44CCE4 within the file /boafrm/formSysCmd, where manipulation of the sysCmd argument enables command injection. Published on 2025-12-05, it is associated with CWE-77 and CWE-78.
The vulnerability is exploitable remotely over the network (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and no user interaction (UI:N), with unchanged scope (S:U). Exploitation yields low impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), resulting in a CVSS v3.1 base score of 4.7. Attackers with sufficient privileges can inject and execute arbitrary OS commands on the device.
No patches or mitigations are available from the vendor, who was contacted early but did not respond. An exploit has been published and may be used, with details available at https://github.com/Kriswu1337/CVE/blob/main/EDIMAX/1/3.md and related VulDB entries including https://vuldb.com/?ctiid.334484, https://vuldb.com/?id.334484, and https://vuldb.com/?submit.696668.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in router web interface (/boafrm/formSysCmd) enables remote exploitation of public-facing application (T1190) for indirect command execution (T1202) and network device CLI abuse (T1059.008).