Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-49134

Опубликовано: 09 апр. 2024
Источник: nvd
CVSS3: 8.1
CVSS3: 9.8
EPSS Низкий

Описание

A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts uclited on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:tp-link:eap225_firmware:5.1.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:eap225:v3:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:tp-link:eap115_firmware:5.0.4:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:eap115:v4:*:*:*:*:*:*:*

EPSS

Процентиль: 66%
0.0052
Низкий

8.1 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-829
CWE-77

Связанные уязвимости

CVSS3: 8.1
github
почти 2 года назад

A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point.

CVSS3: 8.1
fstec
около 2 лет назад

Уязвимость функции tddpd Enable_test_mode беспроводных точек доступа Tp-Link AC1350 и Tp-Link N300, позволяющая нарушителю выполнить произвольный код с root-привилегиями

EPSS

Процентиль: 66%
0.0052
Низкий

8.1 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-829
CWE-77