CVE-2023-48724

A memory corruption vulnerability exists in the web interface functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted HTTP POST request can lead to denial of service of the device's web interface. An attacker can send an unauthenticated HTTP POST request to trigger this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:eap225_firmware:5.1.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:eap225:v3:*:*:*:*:*:*:*

History

21 Aug 2025, 17:45

Type Values Removed Values Added
CPE cpe:2.3:h:tp-link:eap225:v3:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:eap225_firmware:5.1.0:*:*:*:*:*:*:*
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1864 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1864 - Exploit, Third Party Advisory
First Time Tp-link eap225 Firmware
Tp-link eap225
Tp-link
CWE CWE-787

Information

Published : 2024-04-09 15:15

Updated : 2025-08-21 17:45


NVD link : CVE-2023-48724

Mitre link : CVE-2023-48724

CVE.ORG link : CVE-2023-48724


JSON object : View

Products Affected

tp-link

  • eap225_firmware
  • eap225
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write