CVE-2020-37097
Published: 03 February 2026
Summary
CVE-2020-37097 is a high-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Edimax Ew-7438Rpn Mini Firmware. Its CVSS base score is 7.5 (High).
Operationally, ranked at the 18.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Training instructs users on protecting credentials from disclosure or unauthorized access.
Training records for security awareness and role-based training verify education on credential protection practices, tangibly reducing risks from mishandling or exposing credentials.
Protecting authenticator content from unauthorized disclosure and modification while requiring protective controls addresses insufficiently protected credentials.
Rules of behavior include credential protection and non-sharing requirements, reducing exposure of insufficiently protected credentials.
Terminating or revoking credentials stops use of insufficiently protected or lingering credentials post-termination.
Requiring confidentiality/integrity protection for stored credentials directly mitigates insufficiently protected credentials on disk or in configuration stores.
Credentials or keys delivered out-of-band are not exposed to interception or inadequate protection on the main transport.
NVD Description
Edimax EW-7438RPn 1.13 contains an information disclosure vulnerability that exposes WiFi network configuration details through the wlencrypt_wiz.asp file. Attackers can access the script to retrieve sensitive information including WiFi network name and plaintext password stored in device configuration variables.
Deeper analysisAI
CVE-2020-37097 is an information disclosure vulnerability in the Edimax EW-7438RPn WiFi range extender, specifically version 1.13. The flaw occurs in the wlencrypt_wiz.asp file, which exposes sensitive WiFi network configuration details, including the network name (SSID) and plaintext password stored in device configuration variables. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and maps to CWE-522 (Insufficiently Protected Credentials).
The vulnerability can be exploited by remote, unauthenticated attackers with network access to the device and no need for user interaction. By directly accessing the wlencrypt_wiz.asp script, attackers can retrieve the exposed WiFi credentials, enabling them to connect to the protected network or use the information for further attacks.
Advisories and related resources, including the VulnCheck advisory at https://www.vulncheck.com/advisories/edimax-ew-rpn-information-disclosure-wifi-password and a proof-of-concept exploit on Exploit-DB at https://www.exploit-db.com/exploits/48365, provide further technical details. The Edimax product page is at https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/.
Details
- CWE(s)