{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-49134","assignerOrgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","state":"PUBLISHED","assignerShortName":"talos","dateReserved":"2023-11-22T15:34:13.184Z","datePublished":"2024-04-09T14:12:48.096Z","dateUpdated":"2025-11-04T18:19:39.308Z"},"containers":{"cna":{"affected":[{"vendor":"Tp-Link","product":"AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3)","versions":[{"version":"v5.1.0 Build 20220926","status":"affected"}]},{"vendor":"Tp-Link","product":"N300 Wireless Access Point (EAP115)","versions":[{"version":"v5.0.4 Build 20220216","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A command execution vulnerability exists in the tddpd enable_test_mode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. A specially crafted series of network requests can lead to arbitrary command execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.This vulnerability impacts `uclited` on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-829: Inclusion of Functionality from Untrusted Control Sphere","type":"CWE","cweId":"CWE-829"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"}}],"providerMetadata":{"orgId":"b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b","shortName":"talos","dateUpdated":"2024-04-09T17:00:07.303Z"},"references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862","name":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862"}],"credits":[{"lang":"en","value":"Discovered by the Vulnerability Discovery and Research team of Cisco Talos."}]},"adp":[{"affected":[{"vendor":"tp-link","product":"ac1350_firmware","cpes":["cpe:2.3:o:tp-link:ac1350_firmware:v5.1.0_build_20220926:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"v5.1.0_build_20220926","status":"affected"}]},{"vendor":"tp-link","product":"n300_firmware","cpes":["cpe:2.3:o:tp-link:n300_firmware:v5.0.4_build_20220216:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"v5.0.4_build_20220216","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-04-10T19:30:35.924227Z","id":"CVE-2023-49134","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-19T17:42:34.306Z"}},{"title":"CVE Program Container","references":[{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862","name":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1862","tags":["x_transferred"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1862"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T18:19:39.308Z"}}]}}