Cyber Posture

CVE-2024-48418

HighPublic PoC

Published: 27 January 2025

Published
27 January 2025
Modified
28 May 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 31.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-48418 is a high-severity CSRF (CWE-352) vulnerability in Edimax Br-6476Ac Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 31.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 IA-2 (Identification and Authentication (Organizational Users)) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Unix Shell (T1059.004) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly and comprehensively addresses the command injection vulnerability by requiring validation and sanitization of user-provided parameters containing special characters in the /goform/fromSetDDNS request handler.

prevent

Ensures timely remediation of the specific flaw in the DDNS handler through identification, reporting, and patching as provided in the vendor advisory.

prevent

Requires identification and authentication for organizational users accessing the web interface, preventing unauthenticated exploitation (PR:N) from adjacent networks.

MITRE ATT&CK Enterprise TechniquesAI

T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Command injection in the router's web interface (/goform/fromSetDDNS) enables arbitrary Unix shell execution (T1059.004) and exploitation of a public-facing web application (T1190).

NVD Description

In Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06, the request /goform/fromSetDDNS does not properly handle special characters in any of user provided parameters, allowing an attacker with access to the web interface to inject and execute arbitrary shell commands.

Deeper analysisAI

CVE-2024-48418 is a command injection vulnerability affecting the Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC version 1.06. The flaw resides in the /goform/fromSetDDNS request handler, which fails to properly sanitize special characters in user-provided parameters. This allows an attacker with access to the web interface to inject and execute arbitrary shell commands. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-352.

An attacker on an adjacent network can exploit this vulnerability with low complexity and no required privileges or user interaction. By crafting a malicious request to the /goform/fromSetDDNS endpoint with specially crafted parameters containing special characters, the attacker can execute arbitrary shell commands on the router. This grants high-impact control over confidentiality, integrity, and availability, potentially leading to full device compromise.

For mitigation guidance, refer to the vendor advisory at http://edimax.com and the detailed advisory at https://github.com/SpikeReply/advisories/blob/c271ddb997bc0263274118acc380bc71ce9c316b/cve/edimax/cve-2024-48418.md. The vulnerability was published on 2025-01-27.

Details

CWE(s)

Affected Products

edimax
br-6476ac firmware
1.06

CVEs Like This One

CVE-2024-48420Same product: Edimax Br-6476Ac
CVE-2024-48419Same product: Edimax Br-6476Ac
CVE-2024-48416Same product: Edimax Br-6476Ac
CVE-2025-22905Same vendor: Edimax
CVE-2025-1316Same vendor: Edimax
CVE-2025-70161Same vendor: Edimax
CVE-2020-37149Same vendor: Edimax
CVE-2025-22912Same vendor: Edimax
CVE-2025-22916Same vendor: Edimax
CVE-2025-22904Same vendor: Edimax

References