Buffer Overflow Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)
CVE-2023-49912

7.2HIGH

Key Information:

Summary

A stack-based buffer overflow vulnerability has been identified in the web interface of the Radio Scheduling function in the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point. This vulnerability arises when an attacker sends specially crafted HTTP requests, leading to the potential for remote code execution. The vulnerability specifically targets the profile parameter in the httpd binary, with its overflow occurring at offset 0x4224b0. It is critical for users of the affected versions to implement security measures promptly to mitigate risks associated with this exploit. For more information, refer to the detailed report provided by Talos Intelligence.

Affected Version(s)

AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926

N300 Wireless Access Point (EAP115) v5.0.4 Build 20220216

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Discovered by the Vulnerability Discovery and Research team of Cisco Talos.
.