A flaw has been found in Edimax BR-6258n up to 1.18. This issue affects the function formStaDrvSetup of the file /goform/formStaDrvSetup. This manipulation of the argument submit-url causes open redirect. The attack can be initiated remotely. The exploit has been published and may be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.

Project Subscriptions

Vendors Products
Br-6258n Subscribe
Br-6258n Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Edimax br-6258n Firmware
CPEs cpe:2.3:h:edimax:br-6258n:-:*:*:*:*:*:*:*
cpe:2.3:o:edimax:br-6258n_firmware:*:*:*:*:*:*:*:*
Vendors & Products Edimax br-6258n Firmware

Fri, 06 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Edimax
Edimax br-6258n
Vendors & Products Edimax
Edimax br-6258n

Thu, 05 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Edimax BR-6258n up to 1.18. This issue affects the function formStaDrvSetup of the file /goform/formStaDrvSetup. This manipulation of the argument submit-url causes open redirect. The attack can be initiated remotely. The exploit has been published and may be used. The vendor confirms that the affected product is end-of-life. They confirm that they "will issue a consolidated Security Advisory on our official support website." This vulnerability only affects products that are no longer supported by the maintainer.
Title Edimax BR-6258n formStaDrvSetup redirect
Weaknesses CWE-601
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-06T20:27:47.581Z

Reserved: 2026-02-05T13:19:47.470Z

Link: CVE-2026-1970

cve-icon Vulnrichment

Updated: 2026-02-06T20:27:44.494Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-05T22:15:53.900

Modified: 2026-02-20T15:39:54.190

Link: CVE-2026-1970

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-06T12:04:59Z

Weaknesses