8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
39.3%
A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts uclited
on the EAP225(V3) 5.1.0 Build 20220926 of the AC1350 Wireless MU-MIMO Gigabit Access Point.
Vendor | Product | Version | CPE |
---|---|---|---|
tp\-link | tl\-wr941nd_v3 | * | cpe:2.3:h:tp\-link:tl\-wr941nd_v3:*:*:*:*:*:*:*:* |
tp\-link | tp\-link | * | cpe:2.3:a:tp\-link:tp\-link:*:*:*:*:*:*:*:* |
[
{
"vendor": "Tp-Link",
"product": "AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)",
"versions": [
{
"version": "v5.1.0 Build 20220926",
"status": "affected"
}
]
},
{
"vendor": "Tp-Link",
"product": "N300 Wireless Access Point (EAP115)",
"versions": [
{
"version": "v5.0.4 Build 20220216",
"status": "affected"
}
]
}
]
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.2 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
39.3%