Логотип exploitDog
bind:CVE-2018-5393
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-5393

Количество 3

Количество 3

nvd логотип

CVE-2018-5393

больше 7 лет назад

The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service commands in EAP controller versions 2.5.3 and earlier. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-rrgh-7g24-h4hg

больше 3 лет назад

The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service commands in EAP controller versions 2.5.3 and earlier. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2019-03999

больше 7 лет назад

Уязвимость утилиты для удалённого управления точками доступа EAP Controller, связанная с отсутствием аутентификации для критичной функции, позволяющая нарушителю управлять целевым сервером и выполнить произвольный Java или байт-код

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-5393

The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service commands in EAP controller versions 2.5.3 and earlier. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode.

CVSS3: 9.8
16%
Средний
больше 7 лет назад
github логотип
GHSA-rrgh-7g24-h4hg

The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service commands in EAP controller versions 2.5.3 and earlier. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode.

CVSS3: 9.8
16%
Средний
больше 3 лет назад
fstec логотип
BDU:2019-03999

Уязвимость утилиты для удалённого управления точками доступа EAP Controller, связанная с отсутствием аутентификации для критичной функции, позволяющая нарушителю управлять целевым сервером и выполнить произвольный Java или байт-код

CVSS3: 9.8
16%
Средний
больше 7 лет назад

Уязвимостей на страницу