Логотип exploitDog
bind:CVE-2023-49134
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-49134

Количество 3

Количество 3

nvd логотип

CVE-2023-49134

почти 2 года назад

A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-cvxw-g73w-j934

почти 2 года назад

A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point.

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2024-02888

около 2 лет назад

Уязвимость функции tddpd Enable_test_mode беспроводных точек доступа Tp-Link AC1350 и Tp-Link N300, позволяющая нарушителю выполнить произвольный код с root-привилегиями

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-49134

A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point.

CVSS3: 8.1
1%
Низкий
почти 2 года назад
github логотип
GHSA-cvxw-g73w-j934

A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point.

CVSS3: 8.1
1%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02888

Уязвимость функции tddpd Enable_test_mode беспроводных точек доступа Tp-Link AC1350 и Tp-Link N300, позволяющая нарушителю выполнить произвольный код с root-привилегиями

CVSS3: 8.1
1%
Низкий
около 2 лет назад

Уязвимостей на страницу