Stack-based buffer overflow in TP-Link AC1350 EAP225 V3 v5.1.0
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | CVE-2023-49913 | 9 Apr 202414:12 | – | cvelist |
![]() | CVE-2023-49913 | 9 Apr 202415:15 | – | cve |
![]() | CVE-2023-49913 | 9 Apr 202415:15 | – | nvd |
![]() | Unspecified Vulnerability in TP-LINK AC1350 (CNVD-2024-20287) | 11 Apr 202400:00 | – | cnvd |
![]() | Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) web interface Radio Scheduling stack-based buffer overflow vulnerability | 9 Apr 202400:00 | – | talos |
![]() | Multiple vulnerabilities in TP-Link Omada system could lead to root access | 26 Jun 202416:00 | – | talosblog |
![]() | Vulnerability in some TP-Link routers could lead to factory reset | 10 Apr 202416:56 | – | talosblog |
[
{
"cpes": [
"cpe:2.3:o:tp-link:ac1350_firmware:v5.1.0_build_20220926:*:*:*:*:*:*:*"
],
"vendor": "tp-link",
"product": "ac1350_firmware",
"versions": [
{
"status": "affected",
"version": "v5.1.0_build_20220926"
}
],
"defaultStatus": "unknown"
},
{
"cpes": [
"cpe:2.3:o:tp-link:n300_firmware:v5.0.4_build_20220216:*:*:*:*:*:*:*"
],
"vendor": "tp-link",
"product": "n300_firmware",
"versions": [
{
"status": "affected",
"version": "v5.0.4_build_20220216"
}
],
"defaultStatus": "unknown"
}
]
Source | Link |
---|---|
talosintelligence | www.talosintelligence.com/vulnerability_reports/TALOS-2023-1888 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo