Lucene search

K

Tp-link Security Vulnerabilities

cve
cve

CVE-2018-17010

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_host_2g bandwidth.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
28
cve
cve

CVE-2018-17011

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for hosts_info para sun.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
15
cve
cve

CVE-2018-17012

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for hosts_info set_block_flag up_limit.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
20
cve
cve

CVE-2018-17013

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for protocol wan wan_rate.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
17
cve
cve

CVE-2018-17014

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for ip_mac_bind name.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
18
cve
cve

CVE-2018-17015

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for ddns phddns username.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
16
cve
cve

CVE-2018-17016

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for reboot_timer name.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
16
cve
cve

CVE-2018-17017

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for dhcpd udhcpd enable.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
18
cve
cve

CVE-2018-17018

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for time_switch name.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
18
cve
cve

CVE-2018-18428

TP-Link TL-SC3130 1.6.18P12_121101 devices allow unauthenticated RTSP stream access, as demonstrated by a /jpg/image.jpg URI.

7.5CVSS

7.6AI Score

0.045EPSS

2018-10-19 10:29 PM
29
cve
cve

CVE-2018-18489

The ping feature in the Diagnostic functionality on TP-LINK WR840N v2 Firmware 3.16.9 Build 150701 Rel.51516n devices allows remote attackers to cause a denial of service (HTTP service termination) by modifying the packet size to be higher than the UI limit of 1472.

4.9CVSS

5.2AI Score

0.001EPSS

2019-04-16 07:29 PM
27
cve
cve

CVE-2018-19528

TP-Link TL-WR886N 7.0 1.1.0 devices allow remote attackers to cause a denial of service (Tlb Load Exception) via crafted DNS packets to port 53/udp.

9.8CVSS

9.1AI Score

0.007EPSS

2018-11-26 02:29 AM
24
cve
cve

CVE-2018-19537

TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin ...

7.2CVSS

7.3AI Score

0.004EPSS

2018-11-26 03:29 AM
19
cve
cve

CVE-2018-20372

TP-Link TD-W8961ND devices allow XSS via the hostname of a DHCP client.

5.4CVSS

5.2AI Score

0.001EPSS

2022-10-03 04:22 PM
17
cve
cve

CVE-2018-3948

An exploitable denial-of-service vulnerability exists in the URI-parsing functionality of the TP-Link TL-R600VPN HTTP server. A specially crafted URL can cause the server to stop responding to requests, resulting in downtime for the management portal. An attacker can send either an unauthenticated ...

7.5CVSS

7.6AI Score

0.001EPSS

2018-11-30 05:29 PM
53
In Wild
cve
cve

CVE-2018-3949

An exploitable information disclosure vulnerability exists in the HTTP server functionality of the TP-Link TL-R600VPN. A specially crafted URL can cause a directory traversal, resulting in the disclosure of sensitive system files. An attacker can send either an unauthenticated or an authenticated w...

7.5CVSS

7.2AI Score

0.033EPSS

2018-12-01 03:29 AM
50
In Wild
cve
cve

CVE-2018-3950

An exploitable remote code execution vulnerability exists in the ping and tracert functionality of the TP-Link TL-R600VPN HWv3 FRNv1.3.0 and HWv2 FRNv1.2.3 http server. A specially crafted IP address can cause a stack overflow, resulting in remote code execution. An attacker can send a single authe...

8.8CVSS

8.8AI Score

0.006EPSS

2018-12-01 04:29 AM
33
cve
cve

CVE-2018-3951

An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to ...

7.2CVSS

7.7AI Score

0.002EPSS

2018-12-01 06:29 AM
33
cve
cve

CVE-2018-5393

The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service co...

9.8CVSS

9.8AI Score

0.005EPSS

2018-09-28 05:29 PM
33
cve
cve

CVE-2019-12103

The web-based configuration interface of the TP-Link M7350 V3 with firmware before 190531 is affected by a pre-authentication command injection vulnerability.

9.8CVSS

9.6AI Score

0.001EPSS

2019-08-14 09:15 PM
31
cve
cve

CVE-2019-12104

The web-based configuration interface of the TP-Link M7350 V3 with firmware before 190531 is affected by several post-authentication command injection vulnerabilities.

8.8CVSS

8.9AI Score

0.001EPSS

2019-08-14 09:15 PM
28
cve
cve

CVE-2019-12195

TP-Link TL-WR840N v5 00000005 devices allow XSS via the network name. The attacker must log into the router by breaking the password and going to the admin login page by THC-HYDRA to get the network name. With an XSS payload, the network name changed automatically and the internet connection was di...

4.8CVSS

4.9AI Score

0.001EPSS

2019-05-24 04:29 PM
57
cve
cve

CVE-2019-13266

TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. A DHCP Request is sent to the router with a certain Transaction ID field. Following the DHCP protocol, the router responds with...

8.8CVSS

8.6AI Score

0.001EPSS

2019-08-27 06:15 PM
90
cve
cve

CVE-2019-13267

TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. In order to transfer data from the host network to the guest network, the sender joins and then leaves an IGMP group. After it ...

8.8CVSS

8.6AI Score

0.001EPSS

2019-08-27 06:15 PM
93
cve
cve

CVE-2019-13268

TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as...

8.8CVSS

8.7AI Score

0.001EPSS

2019-08-27 06:15 PM
92
cve
cve

CVE-2019-13613

CMD_FTEST_CONFIG in the TP-Link Device Debug protocol in TP-Link Wireless Router Archer Router version 1.0.0 Build 20180502 rel.45702 (EU) and earlier is prone to a stack-based buffer overflow, which allows a remote attacker to achieve code execution or denial of service by sending a crafted payloa...

9.8CVSS

9.4AI Score

0.011EPSS

2019-07-17 05:15 PM
27
cve
cve

CVE-2019-13614

CMD_SET_CONFIG_COUNTRY in the TP-Link Device Debug protocol in TP-Link Archer C1200 1.0.0 Build 20180502 rel.45702 and earlier is prone to a stack-based buffer overflow, which allows a remote attacker to achieve code execution or denial of service by sending a crafted payload to the listening serve...

9.8CVSS

9.4AI Score

0.011EPSS

2019-07-17 06:15 PM
28
cve
cve

CVE-2019-13649

TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow externalPort OS Command Injection (issue 1 of 5).

9.8CVSS

9.7AI Score

0.005EPSS

2019-10-24 03:15 PM
66
cve
cve

CVE-2019-13650

TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow internalPort OS Command Injection (issue 2 of 5).

9.8CVSS

9.7AI Score

0.005EPSS

2019-10-24 03:15 PM
53
cve
cve

CVE-2019-13651

TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow portMappingProtocol OS Command Injection (issue 3 of 5).

9.8CVSS

9.7AI Score

0.004EPSS

2019-10-24 03:15 PM
58
cve
cve

CVE-2019-13652

TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow serviceName OS Command Injection (issue 4 of 5).

9.8CVSS

9.7AI Score

0.005EPSS

2019-10-24 03:15 PM
51
cve
cve

CVE-2019-13653

TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow triggerPort OS Command Injection (issue 5 of 5).

9.8CVSS

9.7AI Score

0.001EPSS

2019-10-24 03:15 PM
57
cve
cve

CVE-2019-15060

The traceroute function on the TP-Link TL-WR840N v4 router with firmware through 0.9.1 3.16 is vulnerable to remote code execution via a crafted payload in an IP address input field.

8.8CVSS

8.7AI Score

0.003EPSS

2019-08-22 07:15 PM
24
cve
cve

CVE-2019-16893

The Web Management of TP-Link TP-SG105E V4 1.0.0 Build 20181120 devices allows an unauthenticated attacker to reboot the device via a reboot.cgi request.

7.5CVSS

7.5AI Score

0.014EPSS

2020-02-03 05:15 PM
62
cve
cve

CVE-2019-17147

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-LINK TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 80 by default. When parsing the Host ...

8.8CVSS

8.9AI Score

0.02EPSS

2020-01-07 11:15 PM
101
cve
cve

CVE-2019-19143

TP-LINK TL-WR849N 0.9.1 4.16 devices do not require authentication to replace the firmware via a POST request to the cgi/softup URI.

6.1CVSS

6.5AI Score

0.003EPSS

2020-01-27 07:15 PM
54
cve
cve

CVE-2019-6487

TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.

8.8CVSS

9AI Score

0.002EPSS

2022-10-03 04:19 PM
24
cve
cve

CVE-2019-6971

An issue was discovered on TP-Link TL-WR1043ND V2 devices. An attacker can send a cookie in an HTTP authentication packet to the router management web interface, and fully control the router without knowledge of the credentials.

9.8CVSS

9.5AI Score

0.048EPSS

2019-06-19 03:15 PM
83
cve
cve

CVE-2019-6972

An issue was discovered on TP-Link TL-WR1043ND V2 devices. The credentials can be easily decoded and cracked by brute-force, WordList, or Rainbow Table attacks. Specifically, credentials in the "Authorization" cookie are encoded with URL encoding and base64, leading to easy decoding. Also, the user...

7.5CVSS

7.6AI Score

0.005EPSS

2019-06-19 03:15 PM
58
cve
cve

CVE-2019-6989

TP-Link TL-WR940N is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the ipAddrDispose function. By sending specially crafted ICMP echo request packets, a remote authenticated attacker could overflow a buffer and execute arbitrary code on the system with elevated ...

8.8CVSS

8.9AI Score

0.055EPSS

2019-06-06 06:29 PM
205
cve
cve

CVE-2020-10231

TP-Link NC200 through 2.1.8_Build_171109, NC210 through 1.0.9_Build_171214, NC220 through 1.3.0_Build_180105, NC230 through 1.3.0_Build_171205, NC250 through 1.3.0_Build_171205, NC260 through 1.5.1_Build_190805, and NC450 through 1.5.0_Build_181022 devices allow a remote NULL Pointer Dereference.

7.5CVSS

7.6AI Score

0.003EPSS

2020-04-01 02:15 PM
64
cve
cve

CVE-2020-10881

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message...

9.8CVSS

9.8AI Score

0.016EPSS

2020-03-25 09:15 PM
31
cve
cve

CVE-2020-10882

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tdpServer service, which listens on UD...

8.8CVSS

8.8AI Score

0.002EPSS

2020-03-25 09:15 PM
93
2
cve
cve

CVE-2020-10883

This vulnerability allows local attackers to escalate privileges on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific fla...

7.8CVSS

7.9AI Score

0.0005EPSS

2020-03-25 09:15 PM
108
cve
cve

CVE-2020-10884

This vulnerability allows network-adjacent attackers execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tdpServer service, which listens on UDP p...

8.8CVSS

8.8AI Score

0.001EPSS

2020-03-25 09:15 PM
111
cve
cve

CVE-2020-10885

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. The issue results fro...

9.8CVSS

9.6AI Score

0.027EPSS

2020-03-25 09:15 PM
45
cve
cve

CVE-2020-10886

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tmpServer service, which listens on TCP port 200...

9.8CVSS

9.7AI Score

0.013EPSS

2020-03-25 09:15 PM
46
2
cve
cve

CVE-2020-10887

This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper f...

9.8CVSS

9.5AI Score

0.008EPSS

2020-03-25 09:15 PM
35
cve
cve

CVE-2020-10888

This vulnerability allows remote attackers to bypass authentication on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of SSH port forwarding requests during i...

9.8CVSS

9.7AI Score

0.027EPSS

2020-03-25 09:15 PM
32
cve
cve

CVE-2020-10916

This vulnerability allows network-adjacent attackers to escalate privileges on affected installations of TP-Link TL-WA855RE Firmware Ver: 855rev4-up-ver1-0-1-P1[20191213-rel60361] Wi-Fi extenders. Although authentication is required to exploit this vulnerability, the existing authentication mechani...

8CVSS

8.2AI Score

0.001EPSS

2020-05-07 11:15 PM
66
Total number of security vulnerabilities370