CVE-2018-5393

The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service commands in EAP controller versions 2.5.3 and earlier. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode.
References
Link Resource
http://www.securityfocus.com/bid/105402 Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/581311 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/105402 Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/581311 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:tp-link:eap_controller:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:08

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/105402 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105402 - Third Party Advisory, VDB Entry
References () https://www.kb.cert.org/vuls/id/581311 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/581311 - Third Party Advisory, US Government Resource

Information

Published : 2018-09-28 17:29

Updated : 2024-11-21 04:08


NVD link : CVE-2018-5393

Mitre link : CVE-2018-5393

CVE.ORG link : CVE-2018-5393


JSON object : View

Products Affected

tp-link

  • eap_controller
CWE
CWE-306

Missing Authentication for Critical Function