Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-49907: CWE-121: Stack-based Buffer Overflow in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)

0
High
VulnerabilityCVE-2023-49907cvecve-2023-49907cwe-121
Published: Tue Apr 09 2024 (04/09/2024, 14:12:46 UTC)
Source: CVE Database V5
Vendor/Project: Tp-Link
Product: AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)

Description

A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `band` parameter at offset `0x0045aad8` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:10:30 UTC

Technical Analysis

CVE-2023-49907 is a stack-based buffer overflow vulnerability categorized under CWE-121, affecting the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) specifically in firmware version 5.1.0 Build 20220926. The vulnerability exists in the web interface's Radio Scheduling feature, where the 'band' parameter is improperly validated before being processed by the httpd_portal binary. An attacker with authenticated access can send a sequence of specially crafted HTTP requests that overflow the stack buffer at offset 0x0045aad8, leading to remote code execution on the device. This allows the attacker to execute arbitrary code with the privileges of the web server process, potentially gaining control over the device, manipulating network traffic, or pivoting to other internal systems. The CVSS v3.1 base score is 7.2, reflecting high severity due to network attack vector (AV:N), low attack complexity (AC:L), but requiring high privileges (PR:H) and no user interaction (UI:N). The vulnerability compromises confidentiality, integrity, and availability (C:H/I:H/A:H). No known public exploits or patches are currently available, increasing the urgency for monitoring and defensive measures. The vulnerability's exploitation scope is limited to authenticated users, which may restrict immediate widespread exploitation but still poses a significant risk in environments where device management interfaces are exposed or credentials are compromised.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network infrastructure security. Compromise of the Tp-Link EAP225 V3 access points could lead to unauthorized network access, interception or manipulation of sensitive data, disruption of wireless services, and potential lateral movement within corporate networks. Organizations relying on these devices for critical connectivity, especially in sectors like finance, healthcare, and government, could face operational downtime and data breaches. The requirement for authentication reduces the risk of remote exploitation by external attackers but increases the threat from insider attackers or those who have obtained valid credentials through phishing or other means. Given the widespread use of Tp-Link devices in small to medium enterprises and some larger deployments across Europe, the vulnerability could have a broad impact if not addressed promptly. Additionally, the lack of a patch at the time of disclosure means organizations must rely on compensating controls to mitigate risk.

Mitigation Recommendations

1. Immediately restrict access to the management interface of affected Tp-Link EAP225 V3 devices to trusted networks and administrators only, using network segmentation and firewall rules. 2. Enforce strong, unique passwords and implement multi-factor authentication for device management accounts to reduce the risk of credential compromise. 3. Monitor network traffic and device logs for unusual activity indicative of exploitation attempts, such as unexpected HTTP requests to the Radio Scheduling interface. 4. Disable the Radio Scheduling feature if it is not required in your environment to eliminate the attack surface. 5. Regularly check for firmware updates from Tp-Link and apply patches as soon as they become available. 6. Consider deploying network intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. 7. Conduct internal audits to identify all instances of the affected device and firmware version within the organization. 8. Educate network administrators about the vulnerability and the importance of securing device credentials and management interfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
talos
Date Reserved
2023-12-01T22:10:32.246Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a473b6d939959c8021c12

Added to database: 11/4/2025, 6:34:35 PM

Last enriched: 11/4/2025, 7:10:30 PM

Last updated: 11/5/2025, 3:43:13 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats