{"id":78749,"date":"2026-05-23T13:45:09","date_gmt":"2026-05-23T10:15:09","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/cve-2026-9297-edimax-br-6428ns-post-request-formwlbasic-command-injection\/"},"modified":"2026-05-23T13:45:09","modified_gmt":"2026-05-23T10:15:09","slug":"cve-2026-9297-edimax-br-6428ns-post-request-formwlbasic-command-injection","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2026-9297-edimax-br-6428ns-post-request-formwlbasic-command-injection\/","title":{"rendered":"CVE-2026-9297 &#8211; Edimax BR-6428NS POST Request formWlbasic command injection"},"content":{"rendered":"<p>CVE ID :CVE-2026-9297<\/p>\n<p>  Published : May 23, 2026, 10:15 a.m. | 46\u00a0minutes ago<\/p>\n<p>  Description :A security vulnerability has been detected in Edimax BR-6428NS 1.10. Affected is the function formWlbasic of the file \/goform\/formWlbasic of the component POST Request Handler. The manipulation of the argument repeaterSSID leads to command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.<\/p>\n<p>  Severity: 0.0 | NA<\/p>\n<p>  Visit the link for more details, such as CVSS details, affected products, timeline, and more&#8230;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE ID :CVE-2026-9297 Published : May 23, 2026, 10:15 a.m. | 46\u00a0minutes ago Description :A security vulnerability has been detected in Edimax BR-6428NS 1.10. Affected is the function formWlbasic of the file \/goform\/formWlbasic of the component POST Request Handler. The manipulation of the argument repeaterSSID leads to command injection. The attack may be initiated remotely. &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-78749","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=78749"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78749\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=78749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=78749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=78749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}