CVE-2025-22906
Published: 16 January 2025
Summary
CVE-2025-22906 is a critical-severity Code Injection (CWE-94) vulnerability in Edimax Re11S Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 15.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and sanitization of user inputs like the L2TPUserName parameter at the /goform/setWAN endpoint to prevent command injection exploitation.
Enforces restrictions on information inputs to block invalid or malicious payloads targeting the vulnerable L2TPUserName parameter.
Mandates timely identification, prioritization, and remediation of the specific command injection flaw in RE11S v1.11 via patching.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in public web endpoint (/goform/setWAN) enables remote unauthenticated exploitation of the application (T1190) and direct arbitrary command execution (T1059).
NVD Description
RE11S v1.11 was discovered to contain a command injection vulnerability via the L2TPUserName parameter at /goform/setWAN.
Deeper analysisAI
CVE-2025-22906, published on 2025-01-16, is a command injection vulnerability (CWE-94) affecting RE11S version 1.11. The issue resides in the /goform/setWAN endpoint, where the L2TPUserName parameter fails to properly sanitize user input, enabling injection of arbitrary commands. This critical flaw carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Remote, unauthenticated attackers can exploit the vulnerability over the network with low complexity and without requiring user interaction. Successful exploitation grants attackers the ability to execute arbitrary commands on the affected device, resulting in high impacts to confidentiality, integrity, and availability, such as full system compromise.
Mitigation details and advisories are referenced at http://re11s.com, a proof-of-concept exploit at https://github.com/xyqer1/RE11S_1.11-setWAN-CommandInjection, and related vendor information at https://www.edimax.com/edimax/global/. Security practitioners should consult these sources for patching instructions or workarounds.
Details
- CWE(s)