10
CVSSv2

CVE-2018-5393

Published: 28/09/2018 Updated: 09/10/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service commands in EAP controller versions 2.5.3 and previous versions. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote malicious user to remotely control the target server and execute Java functions or bytecode.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tp-link eap controller