CVE-2023-49134

A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:eap225_firmware:5.1.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:eap225:v3:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:eap115_firmware:5.0.4:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:eap115:v4:*:*:*:*:*:*:*

History

21 Aug 2025, 17:59

Type Values Removed Values Added
CWE CWE-77
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862 - Exploit, Third Party Advisory
First Time Tp-link eap225 Firmware
Tp-link eap225
Tp-link eap115
Tp-link eap115 Firmware
Tp-link
CPE cpe:2.3:h:tp-link:eap225:v3:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:eap225_firmware:5.1.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:eap115:v4:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:eap115_firmware:5.0.4:*:*:*:*:*:*:*

Information

Published : 2024-04-09 15:15

Updated : 2025-08-21 17:59


NVD link : CVE-2023-49134

Mitre link : CVE-2023-49134

CVE.ORG link : CVE-2023-49134


JSON object : View

Products Affected

tp-link

  • eap225_firmware
  • eap115
  • eap225
  • eap115_firmware
CWE
CWE-829

Inclusion of Functionality from Untrusted Control Sphere

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')