Buffer Overflow Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)
CVE-2023-49912
Summary
A stack-based buffer overflow vulnerability has been identified in the web interface of the Radio Scheduling function in the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point. This vulnerability arises when an attacker sends specially crafted HTTP requests, leading to the potential for remote code execution. The vulnerability specifically targets the profile
parameter in the httpd
binary, with its overflow occurring at offset 0x4224b0
. It is critical for users of the affected versions to implement security measures promptly to mitigate risks associated with this exploit. For more information, refer to the detailed report provided by Talos Intelligence.
Affected Version(s)
AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926
N300 Wireless Access Point (EAP115) v5.0.4 Build 20220216
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved