CVE-2018-5393

The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service commands in EAP controller versions 2.5.3 and earlier. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode.
References
Link Resource
https://www.kb.cert.org/vuls/id/581311 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/105402 Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:tp-link:eap_controller:*:*:*:*:*:*:*:*

Information

Published : 2018-09-28 10:29

Updated : 2019-10-09 16:41


NVD link : CVE-2018-5393

Mitre link : CVE-2018-5393


JSON object : View

CWE
CWE-306

Missing Authentication for Critical Function

Advertisement

dedicated server usa

Products Affected

tp-link

  • eap_controller