<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Edimax — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/edimax/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 03 May 2026 07:16:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/edimax/feed.xml" rel="self" type="application/rss+xml"/><item><title>Edimax BR-6428nC Buffer Overflow Vulnerability (CVE-2026-7684)</title><link>https://feed.craftedsignal.io/briefs/2026-05-edimax-br-6428nc-buffer-overflow/</link><pubDate>Sun, 03 May 2026 07:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edimax-br-6428nc-buffer-overflow/</guid><description>A remote buffer overflow vulnerability exists in Edimax BR-6428nC devices up to version 1.16 via manipulation of the pptpDfGateway argument in the /goform/setWAN file, potentially allowing for arbitrary code execution.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, tracked as CVE-2026-7684, affects Edimax BR-6428nC devices up to version 1.16. The vulnerability resides in the <code>/goform/setWAN</code> file, specifically within the handling of the <code>pptpDfGateway</code> argument. An unauthenticated attacker can exploit this flaw remotely by sending a crafted request to the device. Publicly available exploit code exists, increasing the risk of widespread exploitation. The vendor was notified but did not respond, suggesting that a patch is unlikely and highlighting the need for mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Edimax BR-6428nC device running a vulnerable firmware version (&lt;= 1.16).</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setWAN</code> endpoint.</li>
<li>The request includes the <code>pptpDfGateway</code> parameter with a value exceeding the expected buffer size.</li>
<li>The device processes the request, and the oversized <code>pptpDfGateway</code> value overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker carefully crafts the overflow to overwrite the return address, redirecting execution flow.</li>
<li>Execution is redirected to attacker-controlled code injected within the overflowed buffer.</li>
<li>The attacker gains arbitrary code execution on the device, potentially achieving full system control.</li>
<li>The attacker could then use this control to modify device settings, intercept network traffic, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can allow an attacker to gain complete control of the Edimax BR-6428nC device. This could enable the attacker to intercept and modify network traffic, access sensitive information, or use the device as a point of entry for further attacks within the network. Given the public availability of exploit code, the risk of widespread exploitation is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Edimax_BR_6428nC_Buffer_Overflow_setWAN</code> to detect suspicious HTTP requests targeting the vulnerable endpoint and parameter.</li>
<li>Consider blocking or rate-limiting access to the <code>/goform/setWAN</code> endpoint from untrusted networks.</li>
<li>Since the vendor is unresponsive and a patch is unlikely, network segmentation and access control policies are the best mitigation options.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-7684</category><category>webserver</category></item><item><title>Edimax BR-6208AC Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</link><pubDate>Sun, 03 May 2026 07:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-edimax-bo/</guid><description>A buffer overflow vulnerability exists in Edimax BR-6208AC devices (&lt;= 1.02) via manipulation of the pptpDfGateway argument in the /goform/setWAN endpoint, potentially allowing remote attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A buffer overflow vulnerability, CVE-2026-7685, has been identified in Edimax BR-6208AC routers up to version 1.02. The vulnerability resides within the <code>/goform/setWAN</code> file, specifically related to the <code>pptpDfGateway</code> argument. Successful exploitation of this flaw could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition. Publicly available exploits exist, increasing the risk of widespread exploitation. The vendor was notified but has not responded. Given the ease of exploitation and the potential for significant impact, this vulnerability poses a critical threat to affected devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Edimax BR-6208AC router with firmware version 1.02 or earlier exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/goform/setWAN</code> endpoint.</li>
<li>Within the POST request, the attacker includes the <code>pptpDfGateway</code> argument, injecting a payload exceeding the buffer&rsquo;s expected size.</li>
<li>The router&rsquo;s web server processes the malicious request without proper input validation on the size of the <code>pptpDfGateway</code> argument.</li>
<li>The oversized payload overwrites adjacent memory regions on the stack, potentially including return addresses or other critical data.</li>
<li>When the function attempts to return, it jumps to an address controlled by the attacker, leading to arbitrary code execution.</li>
<li>The attacker executes commands to gain control of the device, potentially installing malware or modifying router settings.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to complete compromise of the Edimax BR-6208AC router. An attacker could leverage this access to perform a variety of malicious activities, including eavesdropping on network traffic, injecting malicious code into web pages served by the router, or using the router as a bot in a larger botnet. Given the availability of public exploits, unpatched devices are at immediate risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Edimax BR-6208AC setWAN Buffer Overflow Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Inspect web server logs for POST requests to <code>/goform/setWAN</code> containing unusually long <code>pptpDfGateway</code> parameters, as detected by the Sigma rule <code>Detect Long pptpDfGateway Parameter</code>.</li>
<li>Apply appropriate network segmentation to limit the blast radius of compromised devices and prevent lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer overflow</category><category>cve-2026-7685</category><category>router</category><category>webserver</category></item></channel></rss>