Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device
2025-03-05T00:15:35.057
2025-03-25T16:46:07.540
Analyzed
CVSSv3.1: 9.8 (CRITICAL)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | edimax | ic-7100_firmware | * | Yes |
Hardware | edimax | ic-7100 | - | No |