{"id":78771,"date":"2026-05-24T10:30:11","date_gmt":"2026-05-24T07:00:11","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/cve-2026-9362-edimax-ew-7438rpn-setting-formconnectionsetting-command-injection\/"},"modified":"2026-05-24T10:30:11","modified_gmt":"2026-05-24T07:00:11","slug":"cve-2026-9362-edimax-ew-7438rpn-setting-formconnectionsetting-command-injection","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2026-9362-edimax-ew-7438rpn-setting-formconnectionsetting-command-injection\/","title":{"rendered":"CVE-2026-9362 &#8211; Edimax EW-7438RPn Setting formConnectionSetting command injection"},"content":{"rendered":"<p>CVE ID :CVE-2026-9362<\/p>\n<p>  Published : May 24, 2026, 7 a.m. | 59\u00a0minutes ago<\/p>\n<p>  Description :A security vulnerability has been detected in Edimax EW-7438RPn 1.12. This vulnerability affects the function formConnectionSetting of the file \/goform\/formConnectionSetting of the component Setting Handler. Such manipulation of the argument max_Conn\/timeOut leads to command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.<\/p>\n<p>  Severity: 0.0 | NA<\/p>\n<p>  Visit the link for more details, such as CVSS details, affected products, timeline, and more&#8230;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE ID :CVE-2026-9362 Published : May 24, 2026, 7 a.m. | 59\u00a0minutes ago Description :A security vulnerability has been detected in Edimax EW-7438RPn 1.12. This vulnerability affects the function formConnectionSetting of the file \/goform\/formConnectionSetting of the component Setting Handler. Such manipulation of the argument max_Conn\/timeOut leads to command injection. The attack may be launched remotely. &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-78771","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=78771"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78771\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=78771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=78771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=78771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}