Buffer Overflow Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)
CVE-2023-49907
Summary
A stack-based buffer overflow vulnerability has been identified in the Radio Scheduling functionality of the web interface for Tp-Link's AC1350 Wireless MU-MIMO Gigabit Access Point, specifically the EAP225 V3 model running v5.1.0 Build 20220926. This vulnerability can be exploited by sending a specially crafted series of HTTP requests, potentially allowing an attacker to execute arbitrary code remotely. The overflow is triggered through the band
parameter located at offset 0x0045aad8
within the httpd_portal
binary included in the affected firmware. This security flaw emphasizes the need for users to ensure their devices are updated and configured securely.
Affected Version(s)
AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926
N300 Wireless Access Point (EAP115) v5.0.4 Build 20220216
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved