CVE-2018-5393
high-risk
Published 2018-09-28
The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service commands in EAP controller versions 2.5.3 and earlier. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode.
Do I need to act?
!
15.7% chance of exploitation in next 30 days
EPSS score — higher than 84% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Eap Controller
Affected Vendors
References (4)
Third Party Advisory
http://www.securityfocus.com/bid/105402
Third Party Advisory
https://www.kb.cert.org/vuls/id/581311
Third Party Advisory
http://www.securityfocus.com/bid/105402
Third Party Advisory
https://www.kb.cert.org/vuls/id/581311
50
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
13/34 · Low
Exposure
5/34 · Minimal