CVE-2023-49134: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)
A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point.
AI Analysis
Technical Summary
CVE-2023-49134 is a command execution vulnerability classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere) affecting specific versions of Tp-Link wireless access points: AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) version 5.1.0 Build 20220926 and N300 Wireless Access Point (EAP115 V4) version 5.0.4 Build 20220216. The vulnerability resides in the tddpd enable_test_mode functionality, which can be manipulated by an attacker through a sequence of specially crafted unauthenticated network requests. These requests target the uclited process on the affected devices, enabling arbitrary command execution without requiring any authentication or user interaction. The CVSS v3.1 base score is 8.1, reflecting high severity due to the network attack vector, no privileges required, and the potential for full compromise of confidentiality, integrity, and availability. The attack complexity is high, meaning exploitation requires precise conditions or knowledge, but once exploited, it allows an attacker to execute arbitrary commands on the device, potentially leading to device takeover, network pivoting, or disruption of network services. No patches are currently linked, and no known exploits have been observed in the wild, but the vulnerability's nature makes it a significant risk for environments relying on these devices for wireless connectivity.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Successful exploitation could allow attackers to execute arbitrary commands on critical wireless access points, leading to unauthorized access to internal networks, interception or manipulation of network traffic, and potential lateral movement to other systems. This could compromise sensitive data confidentiality, disrupt business operations by degrading network availability, and undermine the integrity of network communications. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on these Tp-Link devices for wireless connectivity are particularly vulnerable. The unauthenticated nature of the exploit increases the risk of remote attacks from external threat actors. Additionally, the high attack complexity may limit widespread exploitation but does not eliminate targeted attacks against high-value European targets. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation as details become more widely known.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability. First, identify and inventory all affected Tp-Link devices (EAP225 V3 v5.1.0 and EAP115 V4 v5.0.4) within their networks. Since no official patches are currently available, organizations should consider the following measures: (1) Disable or restrict access to the tddpd service or the enable_test_mode functionality if possible through device configuration or firmware settings. (2) Implement strict network segmentation to isolate vulnerable devices from critical network segments and limit exposure to untrusted networks. (3) Employ firewall rules to block unauthorized inbound traffic targeting the affected devices, especially from external networks. (4) Monitor network traffic for anomalous patterns or repeated malformed packets directed at these access points, which could indicate exploitation attempts. (5) Engage with Tp-Link support or authorized vendors to obtain firmware updates or workarounds as they become available. (6) Consider replacing vulnerable devices with models that have confirmed security updates if mitigation is not feasible. (7) Maintain up-to-date network device inventories and vulnerability management processes to rapidly respond to emerging threats.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-49134: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)
Description
A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point.
AI-Powered Analysis
Technical Analysis
CVE-2023-49134 is a command execution vulnerability classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere) affecting specific versions of Tp-Link wireless access points: AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) version 5.1.0 Build 20220926 and N300 Wireless Access Point (EAP115 V4) version 5.0.4 Build 20220216. The vulnerability resides in the tddpd enable_test_mode functionality, which can be manipulated by an attacker through a sequence of specially crafted unauthenticated network requests. These requests target the uclited process on the affected devices, enabling arbitrary command execution without requiring any authentication or user interaction. The CVSS v3.1 base score is 8.1, reflecting high severity due to the network attack vector, no privileges required, and the potential for full compromise of confidentiality, integrity, and availability. The attack complexity is high, meaning exploitation requires precise conditions or knowledge, but once exploited, it allows an attacker to execute arbitrary commands on the device, potentially leading to device takeover, network pivoting, or disruption of network services. No patches are currently linked, and no known exploits have been observed in the wild, but the vulnerability's nature makes it a significant risk for environments relying on these devices for wireless connectivity.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Successful exploitation could allow attackers to execute arbitrary commands on critical wireless access points, leading to unauthorized access to internal networks, interception or manipulation of network traffic, and potential lateral movement to other systems. This could compromise sensitive data confidentiality, disrupt business operations by degrading network availability, and undermine the integrity of network communications. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on these Tp-Link devices for wireless connectivity are particularly vulnerable. The unauthenticated nature of the exploit increases the risk of remote attacks from external threat actors. Additionally, the high attack complexity may limit widespread exploitation but does not eliminate targeted attacks against high-value European targets. The lack of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation as details become more widely known.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability. First, identify and inventory all affected Tp-Link devices (EAP225 V3 v5.1.0 and EAP115 V4 v5.0.4) within their networks. Since no official patches are currently available, organizations should consider the following measures: (1) Disable or restrict access to the tddpd service or the enable_test_mode functionality if possible through device configuration or firmware settings. (2) Implement strict network segmentation to isolate vulnerable devices from critical network segments and limit exposure to untrusted networks. (3) Employ firewall rules to block unauthorized inbound traffic targeting the affected devices, especially from external networks. (4) Monitor network traffic for anomalous patterns or repeated malformed packets directed at these access points, which could indicate exploitation attempts. (5) Engage with Tp-Link support or authorized vendors to obtain firmware updates or workarounds as they become available. (6) Consider replacing vulnerable devices with models that have confirmed security updates if mitigation is not feasible. (7) Maintain up-to-date network device inventories and vulnerability management processes to rapidly respond to emerging threats.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-11-22T15:34:13.184Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a47396d939959c8021baf
Added to database: 11/4/2025, 6:34:33 PM
Last enriched: 11/4/2025, 7:06:58 PM
Last updated: 11/5/2025, 2:01:39 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumCVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12468: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.