2026-05-24 0:0CVE-2026-9344VulDB
PUBLISHED5.2ApplicationCWE-121CWE-119

Edimax EW-7438RPn webs formWpsStart stack-based overflow

A security vulnerability has been detected in Edimax EW-7438RPn up to 1.31. The impacted element is an unknown function of the file /goform/formWpsStart of the component webs. Such manipulation of the argument pinCode/wlan-url leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Problem type

Affected products

Edimax

EW-7438RPn

1.0 - AFFECTED

1.1 - AFFECTED

1.2 - AFFECTED

1.3 - AFFECTED

1.4 - AFFECTED

1.5 - AFFECTED

1.6 - AFFECTED

1.7 - AFFECTED

1.8 - AFFECTED

1.9 - AFFECTED

1.10 - AFFECTED

1.11 - AFFECTED

1.12 - AFFECTED

1.13 - AFFECTED

1.14 - AFFECTED

1.15 - AFFECTED

1.16 - AFFECTED

1.17 - AFFECTED

1.18 - AFFECTED

1.19 - AFFECTED

1.20 - AFFECTED

1.21 - AFFECTED

1.22 - AFFECTED

1.23 - AFFECTED

1.24 - AFFECTED

1.25 - AFFECTED

1.26 - AFFECTED

1.27 - AFFECTED

1.28 - AFFECTED

1.29 - AFFECTED

1.30 - AFFECTED

1.31 - AFFECTED

References

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-9344
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-9344",
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "dateUpdated": "2026-05-24T00:00:15.168Z",
    "dateReserved": "2026-05-23T08:32:21.210Z",
    "datePublished": "2026-05-24T00:00:15.168Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB",
        "dateUpdated": "2026-05-24T00:00:15.168Z"
      },
      "title": "Edimax EW-7438RPn webs formWpsStart stack-based overflow",
      "descriptions": [
        {
          "lang": "en",
          "value": "A security vulnerability has been detected in Edimax EW-7438RPn up to 1.31. The impacted element is an unknown function of the file /goform/formWpsStart of the component webs. Such manipulation of the argument pinCode/wlan-url leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        }
      ],
      "affected": [
        {
          "vendor": "Edimax",
          "product": "EW-7438RPn",
          "cpes": [
            "cpe:2.3:a:edimax:ew-7438rpn:*:*:*:*:*:*:*:*"
          ],
          "modules": [
            "webs"
          ],
          "versions": [
            {
              "version": "1.0",
              "status": "affected"
            },
            {
              "version": "1.1",
              "status": "affected"
            },
            {
              "version": "1.2",
              "status": "affected"
            },
            {
              "version": "1.3",
              "status": "affected"
            },
            {
              "version": "1.4",
              "status": "affected"
            },
            {
              "version": "1.5",
              "status": "affected"
            },
            {
              "version": "1.6",
              "status": "affected"
            },
            {
              "version": "1.7",
              "status": "affected"
            },
            {
              "version": "1.8",
              "status": "affected"
            },
            {
              "version": "1.9",
              "status": "affected"
            },
            {
              "version": "1.10",
              "status": "affected"
            },
            {
              "version": "1.11",
              "status": "affected"
            },
            {
              "version": "1.12",
              "status": "affected"
            },
            {
              "version": "1.13",
              "status": "affected"
            },
            {
              "version": "1.14",
              "status": "affected"
            },
            {
              "version": "1.15",
              "status": "affected"
            },
            {
              "version": "1.16",
              "status": "affected"
            },
            {
              "version": "1.17",
              "status": "affected"
            },
            {
              "version": "1.18",
              "status": "affected"
            },
            {
              "version": "1.19",
              "status": "affected"
            },
            {
              "version": "1.20",
              "status": "affected"
            },
            {
              "version": "1.21",
              "status": "affected"
            },
            {
              "version": "1.22",
              "status": "affected"
            },
            {
              "version": "1.23",
              "status": "affected"
            },
            {
              "version": "1.24",
              "status": "affected"
            },
            {
              "version": "1.25",
              "status": "affected"
            },
            {
              "version": "1.26",
              "status": "affected"
            },
            {
              "version": "1.27",
              "status": "affected"
            },
            {
              "version": "1.28",
              "status": "affected"
            },
            {
              "version": "1.29",
              "status": "affected"
            },
            {
              "version": "1.30",
              "status": "affected"
            },
            {
              "version": "1.31",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Stack-based Buffer Overflow",
              "cweId": "CWE-121",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Memory Corruption",
              "cweId": "CWE-119",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://vuldb.com/vuln/365307",
          "name": "VDB-365307 | Edimax EW-7438RPn webs formWpsStart stack-based overflow",
          "tags": [
            "vdb-entry",
            "technical-description"
          ]
        },
        {
          "url": "https://vuldb.com/vuln/365307/cti",
          "name": "VDB-365307 | CTI Indicators (IOB, IOC, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ]
        },
        {
          "url": "https://vuldb.com/submit/813885",
          "name": "Submit #813885 | Edimax EW-7438RPn 1.31 Stack-based Buffer Overflow",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://github.com/wudipjq/my_vuln/blob/main/Edimax/vuln_2/2.md",
          "tags": [
            "exploit"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
            "baseScore": 8.8,
            "baseSeverity": "HIGH"
          }
        },
        {
          "cvssV3_0": {
            "version": "3.0",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
            "baseScore": 8.8,
            "baseSeverity": "HIGH"
          }
        },
        {
          "cvssV2_0": {
            "version": "2.0",
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
            "baseScore": 9
          }
        }
      ],
      "timeline": [
        {
          "time": "2026-05-23T00:00:00.000Z",
          "lang": "en",
          "value": "Advisory disclosed"
        },
        {
          "time": "2026-05-23T02:00:00.000Z",
          "lang": "en",
          "value": "VulDB entry created"
        },
        {
          "time": "2026-05-23T10:37:40.000Z",
          "lang": "en",
          "value": "VulDB entry last update"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Bond (VulDB User)",
          "type": "reporter"
        },
        {
          "lang": "en",
          "value": "VulDB CNA Team",
          "type": "coordinator"
        }
      ]
    }
  }
}