We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-48724



Assignertalos
Reserved2023-11-22
Published2024-04-09
Updated2024-08-02

Description

A memory corruption vulnerability exists in the web interface functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted HTTP POST request can lead to denial of service of the device's web interface. An attacker can send an unauthenticated HTTP POST request to trigger this vulnerability.



HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Product status

v5.1.0 Build 20220926
affected

Credits

Discovered by the Vulnerability Discovery and Research team of Cisco Talos.

References

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1864

cve.org CVE-2023-48724

nvd.nist.gov CVE-2023-48724

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-48724
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.