Lucene search

K
cvelistTalosCVELIST:CVE-2023-49134
HistoryApr 09, 2024 - 2:12 p.m.

CVE-2023-49134

2024-04-0914:12:48
CWE-829
talos
www.cve.org
cve-2023-49134
network requests
command execution
tp-link ac1350
tp-link n300
wireless access point
security vulnerability
uclited
gigabit access point

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

39.3%

A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts uclited on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point.

CNA Affected

[
  {
    "vendor": "Tp-Link",
    "product": "AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)",
    "versions": [
      {
        "version": "v5.1.0 Build 20220926",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Tp-Link",
    "product": "N300 Wireless Access Point (EAP115)",
    "versions": [
      {
        "version": "v5.0.4 Build 20220216",
        "status": "affected"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

39.3%

Related for CVELIST:CVE-2023-49134