Lucene search

K
vulnrichmentTalosVULNRICHMENT:CVE-2023-49911
HistoryApr 09, 2024 - 2:12 p.m.

CVE-2023-49911

2024-04-0914:12:46
CWE-121
talos
github.com
4
stack-based
remote code execution
authentication bypass
http request
offset
binary shipped
radio scheduling
tp-link ac1350
eap225 v3

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the band parameter at offset 0x422420 of the httpd binary shipped with v5.0.4 Build 20220216 of the EAP115.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:tp-link:ac1350_firmware:v5.1.0_build_20220926:*:*:*:*:*:*:*"
    ],
    "vendor": "tp-link",
    "product": "ac1350_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "v5.1.0_build_20220926"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:tp-link:n300_firmware:v5.0.4_build_20220216:*:*:*:*:*:*:*"
    ],
    "vendor": "tp-link",
    "product": "n300_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "v5.0.4_build_20220216"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.9

Confidence

Low

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-49911