


Perceptive Security
SOC/SIEM Consultancy

Edimax EW-7438RPn-v3 Mini 1.27 allows unauthenticated attackers to access the /wizard_reboot.asp page in unsetup mode, which discloses the Wi-Fi SSID and securiā¦
Published:
4 februari 2026 om 23:00:00
Alert date:
5 februari 2026 om 21:07:15
Source:
nvd.nist.gov
Mobile & IoT, Network Infrastructure
CVE-2020-37150 affects Edimax EW-7438RPn-v3 Mini version 1.27, allowing unauthenticated attackers to access the /wizard_reboot.asp page in unsetup mode. This vulnerability discloses sensitive Wi-Fi credentials including SSID and security key. Attackers can retrieve wireless passwords by sending a simple GET request to the vulnerable endpoint. The flaw requires no authentication and exposes critical network access information. This represents a significant security risk for affected wireless range extender devices.
Technical details
Mitigation steps:
Affected products:
Edimax EW-7438RPn-v3 Mini
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2020-37150
https://www.edimax.com/edimax/merchandise/merchandise_detail/data/edimax/global/wi-fi_range_extenders_n300/ew-7438rpn_mini/
https://www.exploit-db.com/exploits/48318
https://www.vulncheck.com/advisories/edimax-technology-ew-rpn-mini-unauthorized-access-wi-fi-password-disclosure
Related CVE's:
Related threat actors:
IOC's:
/wizard_reboot.asp
This article was created with the assistance of AI technology by Perceptive.
