Back to VulnFeed / CVE-2026-7684
root@hackertop:~/vulnfeed/CVE-2026-7684#
CVE-2026-7684 HIGH Memory Corruption ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Edimax BR-6428nC up to 1.16 /goform/setWAN pptpDfGateway  buffer overflow

BR-6428nC 22h ago Impact pending confirmation
LIFECYCLE
8.0 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in Edimax BR-6428nC up to 1.16. It has been classified as critical. This affects an unknown function of the file /goform/setWAN. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
The manipulation of the argument pptpDfGateway  with an unknown input leads to a unknown weakness. CWE is classifying the issue as CWE-120. The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

Impact: This is going to have an impact on confidentiality, integrity, and availability.

Exploit: The exploit is shared for download at tzh00203.notion.site. It is declared as proof-of-concept. The vendor was contacted early about this disclosure but did not respond in any way.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7684 · CVSS 8.0 · Active Threat