CVE-2023-49906

A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `ssid` parameter at offset `0x0045ab7c` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:eap225_firmware:5.1.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:eap225:v3:*:*:*:*:*:*:*

History

21 Aug 2025, 17:59

Type Values Removed Values Added
CPE cpe:2.3:h:tp-link:eap225:v3:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:eap225_firmware:5.1.0:*:*:*:*:*:*:*
CWE CWE-787
References () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888 - () https://talosintelligence.com/vulnerability_reports/TALOS-2023-1888 - Exploit, Third Party Advisory
First Time Tp-link eap225 Firmware
Tp-link eap225
Tp-link

Information

Published : 2024-04-09 15:15

Updated : 2025-08-21 17:59


NVD link : CVE-2023-49906

Mitre link : CVE-2023-49906

CVE.ORG link : CVE-2023-49906


JSON object : View

Products Affected

tp-link

  • eap225_firmware
  • eap225
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write