Lucene search

K
Tp-linkTl-wr840n Firmware

19 matches found

CVE
CVE
added 2021/11/13 3:15 p.m.233 views

CVE-2021-41653

The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.

10CVSS9.5AI score0.91914EPSS
CVE
CVE
added 2022/02/25 8:15 p.m.174 views

CVE-2022-25060

TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a command injection vulnerability via the component oal_startPing.

10CVSS9.8AI score0.84025EPSS
CVE
CVE
added 2022/02/25 8:15 p.m.92 views

CVE-2022-25064

TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a remote code execution (RCE) vulnerability via the function oal_wan6_setIpAddr.

9.8CVSS9.9AI score0.56249EPSS
CVE
CVE
added 2022/03/28 11:15 p.m.88 views

CVE-2022-26641

TP-LINK TL-WR840N(ES)_V6.20 was discovered to contain a buffer overflow via the httpRemotePort parameter.

7.2CVSS7.2AI score0.00453EPSS
CVE
CVE
added 2022/02/25 8:15 p.m.82 views

CVE-2022-25061

TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a command injection vulnerability via the component oal_setIp6DefaultRoute.

9.8CVSS9.8AI score0.82307EPSS
CVE
CVE
added 2022/02/25 8:15 p.m.77 views

CVE-2022-25062

TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain an integer overflow via the function dm_checkString. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.

7.5CVSS7.4AI score0.28956EPSS
CVE
CVE
added 2019/05/24 4:29 p.m.74 views

CVE-2019-12195

TP-Link TL-WR840N v5 00000005 devices allow XSS via the network name. The attacker must log into the router by breaking the password and going to the admin login page by THC-HYDRA to get the network name. With an XSS payload, the network name changed automatically and the internet connection was di...

4.8CVSS4.9AI score0.00361EPSS
CVE
CVE
added 2022/03/28 11:15 p.m.73 views

CVE-2022-26639

TP-LINK TL-WR840N(ES)_V6.20 was discovered to contain a buffer overflow via the DNSServers parameter.

7.2CVSS7.2AI score0.00453EPSS
CVE
CVE
added 2022/03/28 11:15 p.m.71 views

CVE-2022-26640

TP-LINK TL-WR840N(ES)_V6.20 was discovered to contain a buffer overflow via the minAddress parameter.

7.2CVSS7.2AI score0.00453EPSS
CVE
CVE
added 2022/04/18 4:15 p.m.68 views

CVE-2021-46122

Tp-Link TL-WR840N (EU) v6.20 Firmware (0.9.1 4.17 v0001.0 Build 201124 Rel.64328n) is vulnerable to Buffer Overflow via the Password reset feature.

9CVSS7AI score0.00414EPSS
CVE
CVE
added 2022/05/25 6:15 p.m.66 views

CVE-2022-29402

TP-Link TL-WR840N EU v6.20 was discovered to contain insecure protections for its UART console. This vulnerability allows attackers to connect to the UART port via a serial connection and execute commands as the root user without authentication.

7.2CVSS6.8AI score0.0021EPSS
CVE
CVE
added 2022/03/28 11:15 p.m.64 views

CVE-2022-26642

TP-LINK TL-WR840N(ES)_V6.20 was discovered to contain a buffer overflow via the X_TP_ClonedMACAddress parameter.

7.2CVSS7.2AI score0.00453EPSS
CVE
CVE
added 2021/01/06 9:15 p.m.60 views

CVE-2020-36178

oal_ipt_addBridgeIsolationRules on TP-Link TL-WR840N 6_EU_0.9.1_4.16 devices allows OS command injection because a raw string entered from the web interface (an IP address field) is used directly for a call to the system library function (for iptables). NOTE: oal_ipt_addBridgeIsolationRules is not ...

10CVSS9.7AI score0.1227EPSS
CVE
CVE
added 2018/08/15 5:29 p.m.52 views

CVE-2018-15172

TP-Link WR840N devices have a buffer overflow via a long Authorization HTTP header.

7.5CVSS7.8AI score0.101EPSS
CVE
CVE
added 2018/06/04 2:29 p.m.42 views

CVE-2018-11714

An issue was discovered on TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n and TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Build 170622 Rel.64334n devices. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a header of "...

10CVSS9.3AI score0.0594EPSS
CVE
CVE
added 2019/08/22 7:15 p.m.36 views

CVE-2019-15060

The traceroute function on the TP-Link TL-WR840N v4 router with firmware through 0.9.1 3.16 is vulnerable to remote code execution via a crafted payload in an IP address input field.

8.8CVSS8.7AI score0.03146EPSS
CVE
CVE
added 2021/08/19 4:15 p.m.34 views

CVE-2021-29280

In TP-Link Wireless N Router WR840N an ARP poisoning attack can cause buffer overflow

6.4CVSS6.7AI score0.00098EPSS
CVE
CVE
added 2019/03/29 6:29 p.m.32 views

CVE-2018-15840

TP-Link TL-WR840N devices allow remote attackers to cause a denial of service (networking outage) via fragmented packets, as demonstrated by an "nmap -f" command.

7.5CVSS7.5AI score0.0065EPSS
CVE
CVE
added 2015/01/09 6:59 p.m.27 views

CVE-2014-9510

Cross-site request forgery (CSRF) vulnerability in the administration console in TP-Link TL-WR840N (V1) router with firmware before 3.13.27 build 141120 allows remote attackers to hijack the authentication of administrators for requests that change router settings via a configuration file import.

6.8CVSS7.4AI score0.00128EPSS