The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service commands in EAP controller versions 2.5.3 and earlier. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode.
References
Link Resource
http://www.securityfocus.com/bid/105402 Third Party Advisory VDB Entry
https://www.kb.cert.org/vuls/id/581311 Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: certcc

Published: 2018-09-28T17:00:00

Updated: 2018-09-29T09:57:01

Reserved: 2018-01-12T00:00:00


Link: CVE-2018-5393

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-09-28T17:29:00.483

Modified: 2019-10-09T23:41:17.437


Link: CVE-2018-5393

JSON object: View

cve-icon Redhat Information

No data.

CWE