We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-49133



Assignertalos
Reserved2023-11-22
Published2024-04-09
Updated2024-08-02

Description

A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP225(V3) 5.1.0 Build 20220926 of the AC1350 Wireless MU-MIMO Gigabit Access Point.



HIGH: 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Product status

v5.1.0 Build 20220926
affected

v5.0.4 Build 20220216
affected

Credits

Discovered by the Vulnerability Discovery and Research team of Cisco Talos.

References

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862

cve.org CVE-2023-49133

nvd.nist.gov CVE-2023-49133

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-49133

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.