First published: Wed Apr 16 2025(Updated: )
SQL Injection vulnerability exists in the TP-Link EAP120 router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the login fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link EAP120 Firmware | ||
All of | ||
TP-Link EAP120 Firmware | =1.0 | |
TP-Link EAP120 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-29648 is assessed as a critical vulnerability due to its potential for SQL injection attacks.
To fix CVE-2025-29648, ensure you apply the latest firmware updates provided by TP-Link for the EAP120 router.
The potential impacts of CVE-2025-29648 include unauthorized data access, data manipulation, and complete system compromise.
The CVE-2025-29648 vulnerability affects users of the TP-Link EAP120 router running version 1.0.
Yes, CVE-2025-29648 can be exploited remotely by an unauthenticated attacker through the login dashboard.