CVE-2023-49908: CWE-121: Stack-based Buffer Overflow in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x0045abc8` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225.
AI Analysis
Technical Summary
CVE-2023-49908 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) firmware version 5.1.0 Build 20220926. The vulnerability resides in the web interface's Radio Scheduling functionality, specifically triggered by a malformed 'profile' parameter in the httpd_portal binary at offset 0x0045abc8. An attacker with authenticated HTTP access can send a specially crafted series of requests that overflow the stack buffer, allowing remote code execution (RCE) on the device. The CVSS 3.1 base score is 7.2 (high), reflecting network attack vector, low attack complexity, required privileges (authenticated), no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability enables an attacker to potentially take full control of the access point, manipulate network traffic, intercept sensitive data, or disrupt network services. No public exploits have been reported yet, but the vulnerability's nature and impact make it a critical concern for network security. The affected firmware version is specifically 5.1.0 Build 20220926, and no patch links are currently available, indicating that users must monitor vendor advisories closely. The vulnerability's exploitation requires authentication, which somewhat limits exposure but does not eliminate risk, especially in environments where management interfaces are exposed or credentials are weak. The device is commonly deployed in enterprise and SMB environments for wireless access, making it a valuable target for attackers aiming to compromise network infrastructure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, particularly for enterprises and SMBs relying on the Tp-Link EAP225 V3 for wireless connectivity. Successful exploitation can lead to full device compromise, enabling attackers to intercept or manipulate network traffic, launch further attacks within the internal network, or cause denial of service by disrupting wireless access. Confidentiality of sensitive communications can be breached, and integrity of network operations compromised. Availability of wireless services may be impacted, affecting business continuity. Given the device's role in network infrastructure, exploitation could facilitate lateral movement and persistence within corporate networks. Organizations with remote or poorly segmented management interfaces are at higher risk. The lack of a current patch increases the urgency for interim mitigations. The threat is particularly relevant for sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government agencies in Europe.
Mitigation Recommendations
1. Immediately restrict access to the web management interface of the affected Tp-Link EAP225 devices to trusted internal networks only, using firewall rules or VLAN segmentation. 2. Enforce strong authentication mechanisms and change default or weak passwords to prevent unauthorized authenticated access. 3. Monitor device logs and network traffic for unusual HTTP requests targeting the Radio Scheduling functionality or anomalous behavior indicative of exploitation attempts. 4. Disable the Radio Scheduling feature if not required to reduce the attack surface. 5. Regularly check Tp-Link's official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 6. Implement network segmentation to isolate wireless infrastructure from critical systems and sensitive data environments. 7. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation patterns related to this vulnerability. 8. Conduct periodic security audits and vulnerability assessments on network devices to identify and remediate similar risks proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-49908: CWE-121: Stack-based Buffer Overflow in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)
Description
A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `profile` parameter at offset `0x0045abc8` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225.
AI-Powered Analysis
Technical Analysis
CVE-2023-49908 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) firmware version 5.1.0 Build 20220926. The vulnerability resides in the web interface's Radio Scheduling functionality, specifically triggered by a malformed 'profile' parameter in the httpd_portal binary at offset 0x0045abc8. An attacker with authenticated HTTP access can send a specially crafted series of requests that overflow the stack buffer, allowing remote code execution (RCE) on the device. The CVSS 3.1 base score is 7.2 (high), reflecting network attack vector, low attack complexity, required privileges (authenticated), no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability enables an attacker to potentially take full control of the access point, manipulate network traffic, intercept sensitive data, or disrupt network services. No public exploits have been reported yet, but the vulnerability's nature and impact make it a critical concern for network security. The affected firmware version is specifically 5.1.0 Build 20220926, and no patch links are currently available, indicating that users must monitor vendor advisories closely. The vulnerability's exploitation requires authentication, which somewhat limits exposure but does not eliminate risk, especially in environments where management interfaces are exposed or credentials are weak. The device is commonly deployed in enterprise and SMB environments for wireless access, making it a valuable target for attackers aiming to compromise network infrastructure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, particularly for enterprises and SMBs relying on the Tp-Link EAP225 V3 for wireless connectivity. Successful exploitation can lead to full device compromise, enabling attackers to intercept or manipulate network traffic, launch further attacks within the internal network, or cause denial of service by disrupting wireless access. Confidentiality of sensitive communications can be breached, and integrity of network operations compromised. Availability of wireless services may be impacted, affecting business continuity. Given the device's role in network infrastructure, exploitation could facilitate lateral movement and persistence within corporate networks. Organizations with remote or poorly segmented management interfaces are at higher risk. The lack of a current patch increases the urgency for interim mitigations. The threat is particularly relevant for sectors with critical infrastructure or sensitive data, such as finance, healthcare, and government agencies in Europe.
Mitigation Recommendations
1. Immediately restrict access to the web management interface of the affected Tp-Link EAP225 devices to trusted internal networks only, using firewall rules or VLAN segmentation. 2. Enforce strong authentication mechanisms and change default or weak passwords to prevent unauthorized authenticated access. 3. Monitor device logs and network traffic for unusual HTTP requests targeting the Radio Scheduling functionality or anomalous behavior indicative of exploitation attempts. 4. Disable the Radio Scheduling feature if not required to reduce the attack surface. 5. Regularly check Tp-Link's official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 6. Implement network segmentation to isolate wireless infrastructure from critical systems and sensitive data environments. 7. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation patterns related to this vulnerability. 8. Conduct periodic security audits and vulnerability assessments on network devices to identify and remediate similar risks proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2023-12-01T22:10:32.246Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a473c6d939959c8021c4e
Added to database: 11/4/2025, 6:34:36 PM
Last enriched: 11/4/2025, 7:10:47 PM
Last updated: 11/5/2025, 2:42:25 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumCVE-2025-58337: CWE-284 Improper Access Control in Apache Software Foundation Apache Doris-MCP-Server
UnknownCVE-2025-12469: CWE-862 Missing Authorization in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumCVE-2025-12468: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in amans2k FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.