Cyber Posture

CVE-2020-37097

HighPublic PoC

Published: 03 February 2026

Published
03 February 2026
Modified
20 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0006 18.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2020-37097 is a high-severity Insufficiently Protected Credentials (CWE-522) vulnerability in Edimax Ew-7438Rpn Mini Firmware. Its CVSS base score is 7.5 (High).

Operationally, ranked at the 18.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-522

Training instructs users on protecting credentials from disclosure or unauthorized access.

addresses: CWE-522

Training records for security awareness and role-based training verify education on credential protection practices, tangibly reducing risks from mishandling or exposing credentials.

addresses: CWE-522

Protecting authenticator content from unauthorized disclosure and modification while requiring protective controls addresses insufficiently protected credentials.

addresses: CWE-522

Rules of behavior include credential protection and non-sharing requirements, reducing exposure of insufficiently protected credentials.

addresses: CWE-522

Terminating or revoking credentials stops use of insufficiently protected or lingering credentials post-termination.

addresses: CWE-522

Requiring confidentiality/integrity protection for stored credentials directly mitigates insufficiently protected credentials on disk or in configuration stores.

addresses: CWE-522

Credentials or keys delivered out-of-band are not exposed to interception or inadequate protection on the main transport.

NVD Description

Edimax EW-7438RPn 1.13 contains an information disclosure vulnerability that exposes WiFi network configuration details through the wlencrypt_wiz.asp file. Attackers can access the script to retrieve sensitive information including WiFi network name and plaintext password stored in device configuration variables.

Deeper analysisAI

CVE-2020-37097 is an information disclosure vulnerability in the Edimax EW-7438RPn WiFi range extender, specifically version 1.13. The flaw occurs in the wlencrypt_wiz.asp file, which exposes sensitive WiFi network configuration details, including the network name (SSID) and plaintext password stored in device configuration variables. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and maps to CWE-522 (Insufficiently Protected Credentials).

The vulnerability can be exploited by remote, unauthenticated attackers with network access to the device and no need for user interaction. By directly accessing the wlencrypt_wiz.asp script, attackers can retrieve the exposed WiFi credentials, enabling them to connect to the protected network or use the information for further attacks.

Advisories and related resources, including the VulnCheck advisory at https://www.vulncheck.com/advisories/edimax-ew-rpn-information-disclosure-wifi-password and a proof-of-concept exploit on Exploit-DB at https://www.exploit-db.com/exploits/48365, provide further technical details. The Edimax product page is at https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/.

Details

CWE(s)

Affected Products

edimax
ew-7438rpn mini firmware
1.13

CVEs Like This One

CVE-2020-37149Same product: Edimax Ew-7438Rpn Mini
CVE-2020-37125Same product: Edimax Ew-7438Rpn Mini
CVE-2020-37150Same product: Edimax Ew-7438Rpn Mini
CVE-2025-22906Same vendor: Edimax
CVE-2025-22913Same vendor: Edimax
CVE-2026-1972Same vendor: Edimax
CVE-2025-22916Same vendor: Edimax
CVE-2025-22905Same vendor: Edimax
CVE-2025-22912Same vendor: Edimax
CVE-2024-48420Same vendor: Edimax

References