CVE-2023-49133: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)
A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP225(V3) 5.1.0 Build 20220926 of the AC1350 Wireless MU-MIMO Gigabit Access Point.
AI Analysis
Technical Summary
CVE-2023-49133 is a command injection vulnerability classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere) affecting specific versions of Tp-Link wireless access points, notably the AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) version 5.1.0 Build 20220926 and the N300 Wireless Access Point (EAP115 V4) version 5.0.4 Build 20220216. The vulnerability resides in the 'tddpd enable_test_mode' functionality within the 'uclited' process. An attacker can exploit this flaw by sending a sequence of unauthenticated, specially crafted network packets that manipulate the device into executing arbitrary system commands. This can lead to full compromise of the device, allowing attackers to execute code with the privileges of the vulnerable service, potentially gaining control over the device and the network traffic it handles. The vulnerability is remotely exploitable without any authentication or user interaction, increasing the risk of widespread exploitation. The CVSS v3.1 score of 8.1 indicates high severity, with impacts on confidentiality, integrity, and availability. No patches or official fixes are currently linked, and no known exploits have been observed in the wild, but the exposure remains critical due to the ease of exploitation and the common deployment of these devices in enterprise and small business networks. The vulnerability could be leveraged for network reconnaissance, lateral movement, or as a foothold for further attacks within an organization's infrastructure.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the potential for unauthorized remote command execution on widely deployed Tp-Link access points. Compromise of these devices can lead to interception or manipulation of network traffic, disruption of wireless connectivity, and unauthorized access to internal networks. This can affect confidentiality by exposing sensitive data, integrity by allowing attackers to alter network configurations or data flows, and availability by causing denial of service or device instability. Organizations relying on these access points for critical communications, especially in sectors like finance, healthcare, and government, may face operational disruptions and data breaches. The unauthenticated nature of the exploit increases the likelihood of attacks originating from external threat actors, including cybercriminals and state-sponsored groups. Additionally, the lack of current patches means organizations must rely on mitigation strategies to reduce exposure until updates are available. The impact is amplified in environments where these devices serve as primary network access points or are part of larger managed network infrastructures.
Mitigation Recommendations
1. Immediately identify and inventory all affected Tp-Link devices (EAP225 V3 v5.1.0 Build 20220926 and EAP115 V4 v5.0.4 Build 20220216) within the network. 2. Apply any available firmware updates from Tp-Link as soon as they are released; monitor vendor communications closely. 3. If firmware updates are not yet available, disable or restrict access to the 'tddpd enable_test_mode' functionality if possible via device configuration or management interfaces. 4. Segment vulnerable devices on isolated network segments with strict firewall rules to limit exposure from untrusted networks, especially the internet. 5. Implement network intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious packets targeting these devices. 6. Enforce strong network access controls and limit management interfaces to trusted administrative networks only. 7. Regularly audit device logs for unusual activity indicative of exploitation attempts. 8. Consider replacing vulnerable devices with models that have confirmed security patches if mitigation is insufficient. 9. Educate network administrators about the vulnerability and ensure incident response plans include steps for this specific threat. 10. Collaborate with cybersecurity vendors and threat intelligence providers to stay informed about emerging exploits or patches.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-49133: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)
Description
A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP225(V3) 5.1.0 Build 20220926 of the AC1350 Wireless MU-MIMO Gigabit Access Point.
AI-Powered Analysis
Technical Analysis
CVE-2023-49133 is a command injection vulnerability classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere) affecting specific versions of Tp-Link wireless access points, notably the AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) version 5.1.0 Build 20220926 and the N300 Wireless Access Point (EAP115 V4) version 5.0.4 Build 20220216. The vulnerability resides in the 'tddpd enable_test_mode' functionality within the 'uclited' process. An attacker can exploit this flaw by sending a sequence of unauthenticated, specially crafted network packets that manipulate the device into executing arbitrary system commands. This can lead to full compromise of the device, allowing attackers to execute code with the privileges of the vulnerable service, potentially gaining control over the device and the network traffic it handles. The vulnerability is remotely exploitable without any authentication or user interaction, increasing the risk of widespread exploitation. The CVSS v3.1 score of 8.1 indicates high severity, with impacts on confidentiality, integrity, and availability. No patches or official fixes are currently linked, and no known exploits have been observed in the wild, but the exposure remains critical due to the ease of exploitation and the common deployment of these devices in enterprise and small business networks. The vulnerability could be leveraged for network reconnaissance, lateral movement, or as a foothold for further attacks within an organization's infrastructure.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the potential for unauthorized remote command execution on widely deployed Tp-Link access points. Compromise of these devices can lead to interception or manipulation of network traffic, disruption of wireless connectivity, and unauthorized access to internal networks. This can affect confidentiality by exposing sensitive data, integrity by allowing attackers to alter network configurations or data flows, and availability by causing denial of service or device instability. Organizations relying on these access points for critical communications, especially in sectors like finance, healthcare, and government, may face operational disruptions and data breaches. The unauthenticated nature of the exploit increases the likelihood of attacks originating from external threat actors, including cybercriminals and state-sponsored groups. Additionally, the lack of current patches means organizations must rely on mitigation strategies to reduce exposure until updates are available. The impact is amplified in environments where these devices serve as primary network access points or are part of larger managed network infrastructures.
Mitigation Recommendations
1. Immediately identify and inventory all affected Tp-Link devices (EAP225 V3 v5.1.0 Build 20220926 and EAP115 V4 v5.0.4 Build 20220216) within the network. 2. Apply any available firmware updates from Tp-Link as soon as they are released; monitor vendor communications closely. 3. If firmware updates are not yet available, disable or restrict access to the 'tddpd enable_test_mode' functionality if possible via device configuration or management interfaces. 4. Segment vulnerable devices on isolated network segments with strict firewall rules to limit exposure from untrusted networks, especially the internet. 5. Implement network intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious packets targeting these devices. 6. Enforce strong network access controls and limit management interfaces to trusted administrative networks only. 7. Regularly audit device logs for unusual activity indicative of exploitation attempts. 8. Consider replacing vulnerable devices with models that have confirmed security patches if mitigation is insufficient. 9. Educate network administrators about the vulnerability and ensure incident response plans include steps for this specific threat. 10. Collaborate with cybersecurity vendors and threat intelligence providers to stay informed about emerging exploits or patches.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-11-22T15:34:13.184Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a47396d939959c8021bab
Added to database: 11/4/2025, 6:34:33 PM
Last enriched: 11/4/2025, 7:06:36 PM
Last updated: 12/14/2025, 1:12:05 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14659: Command Injection in D-Link DIR-860LB1
HighCVE-2025-14656: Buffer Overflow in Tenda AC20
HighCVE-2025-14655: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-14654: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-14653: SQL Injection in itsourcecode Student Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.