We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-48724



Description

A memory corruption vulnerability exists in the web interface functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted HTTP POST request can lead to denial of service of the device's web interface. An attacker can send an unauthenticated HTTP POST request to trigger this vulnerability.

Reserved 2023-11-22 | Published 2024-04-09 | Updated 2024-08-02 | Assigner talos


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-121: Stack-based Buffer Overflow

Product status

v5.1.0 Build 20220926
affected

Credits

Discovered by the Vulnerability Discovery and Research team of Cisco Talos.

References

talosintelligence.com/vulnerability_reports/TALOS-2023-1864

cve.org (CVE-2023-48724)

nvd.nist.gov (CVE-2023-48724)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-48724

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.