ID

VAR-202404-0371


CVE

CVE-2023-49913


TITLE

TP-LINK Technologies  of  EAP225  firmware and  EAP115  Out-of-bounds write vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2023-029692

DESCRIPTION

A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `action` parameter at offset `0x422448` of the `httpd` binary shipped with v5.0.4 Build 20220216 of the EAP115. TP-LINK Technologies of EAP225 firmware and EAP115 An out-of-bounds write vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TP-LINK AC1350 is a router from China's TP-LINK company

Trust: 2.16

sources: NVD: CVE-2023-49913 // JVNDB: JVNDB-2023-029692 // CNVD: CNVD-2024-20287

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-20287

AFFECTED PRODUCTS

vendor:tp linkmodel:eap225scope:eqversion:5.1.0

Trust: 1.0

vendor:tp linkmodel:eap115scope:eqversion:5.0.4

Trust: 1.0

vendor:tp linkmodel:eap115scope: - version: -

Trust: 0.8

vendor:tp linkmodel:eap225scope: - version: -

Trust: 0.8

vendor:tp linkmodel:ac1350 buildscope:eqversion:v5.1.020220926

Trust: 0.6

sources: CNVD: CNVD-2024-20287 // JVNDB: JVNDB-2023-029692 // NVD: CVE-2023-49913

CVSS

SEVERITY

CVSSV2

CVSSV3

talos-cna@cisco.com: CVE-2023-49913
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2023-49913
value: HIGH

Trust: 1.0

NVD: CVE-2023-49913
value: HIGH

Trust: 0.8

CNVD: CNVD-2024-20287
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-20287
severity: HIGH
baseScore: 8.3
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

talos-cna@cisco.com: CVE-2023-49913
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2023-49913
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2023-49913
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-20287 // JVNDB: JVNDB-2023-029692 // NVD: CVE-2023-49913 // NVD: CVE-2023-49913

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:CWE-121

Trust: 1.0

problemtype:Stack-based buffer overflow (CWE-121) [ others ]

Trust: 0.8

problemtype: Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-029692 // NVD: CVE-2023-49913

PATCH

title:Patch for TP-LINK AC1350 has an unspecified vulnerability (CNVD-2024-20287)url:https://www.cnvd.org.cn/patchInfo/show/544066

Trust: 0.6

sources: CNVD: CNVD-2024-20287

EXTERNAL IDS

db:NVDid:CVE-2023-49913

Trust: 3.2

db:TALOSid:TALOS-2023-1888

Trust: 1.8

db:JVNDBid:JVNDB-2023-029692

Trust: 0.8

db:CNVDid:CNVD-2024-20287

Trust: 0.6

sources: CNVD: CNVD-2024-20287 // JVNDB: JVNDB-2023-029692 // NVD: CVE-2023-49913

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2023-1888

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-49913

Trust: 1.4

sources: CNVD: CNVD-2024-20287 // JVNDB: JVNDB-2023-029692 // NVD: CVE-2023-49913

SOURCES

db:CNVDid:CNVD-2024-20287
db:JVNDBid:JVNDB-2023-029692
db:NVDid:CVE-2023-49913

LAST UPDATE DATE

2025-08-23T22:55:26.323000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-20287date:2024-04-25T00:00:00
db:JVNDBid:JVNDB-2023-029692date:2025-08-22T04:42:00
db:NVDid:CVE-2023-49913date:2025-08-21T18:00:54.850

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-20287date:2024-04-18T00:00:00
db:JVNDBid:JVNDB-2023-029692date:2025-08-22T00:00:00
db:NVDid:CVE-2023-49913date:2024-04-09T15:15:30.783