Vulnerability Description
A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP225(V3) 5.1.0 Build 20220926 of the AC1350 Wireless MU-MIMO Gigabit Access Point.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Eap225 Firmware | 5.1.0 |
| Tp-Link | Eap225 | v3 |
| Tp-Link | Eap115 Firmware | 5.0.4 |
| Tp-Link | Eap115 | v4 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862ExploitThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1862
FAQ
What is CVE-2023-49133?
CVE-2023-49133 is a vulnerability with a CVSS score of 8.1 (HIGH). A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless...
How severe is CVE-2023-49133?
CVE-2023-49133 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-49133?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Eap225 Firmware, Tp-Link Eap225, Tp-Link Eap115 Firmware, Tp-Link Eap115.