Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device
2025-03-05T00:15:35.057
2025-10-30T15:54:20.360
Analyzed
CVSSv3.1: 9.8 (CRITICAL)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | edimax | ic-7100_firmware | * | Yes |
| Hardware | edimax | ic-7100 | - | No |