A stack-based buffer overflow vulnerability exists in the web interface Radio Scheduling functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926. A specially crafted series of HTTP requests can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability refers specifically to the overflow that occurs via the `ssid` parameter at offset `0x0045ab7c` of the `httpd_portal` binary shipped with v5.1.0 Build 20220926 of the EAP225.
History

Thu, 21 Aug 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link eap225
Tp-link eap225 Firmware
Weaknesses CWE-787
CPEs cpe:2.3:h:tp-link:eap225:v3:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:eap225_firmware:5.1.0:*:*:*:*:*:*:*
Vendors & Products Tp-link
Tp-link eap225
Tp-link eap225 Firmware

cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published: 2024-04-09T14:12:46.099Z

Updated: 2024-08-02T22:09:48.202Z

Reserved: 2023-12-01T22:10:32.245Z

Link: CVE-2023-49906

cve-icon Vulnrichment

Updated: 2024-08-02T22:09:48.202Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-09T15:15:29.433

Modified: 2025-08-21T17:59:26.517

Link: CVE-2023-49906

cve-icon Redhat

No data.